[Secure-testing-team] Bug#879231: ruby2.3: CVE-2017-0903: Unsafe object deserialization through YAML formatted gem specifications
Salvatore Bonaccorso
carnil at debian.org
Fri Oct 20 19:32:28 UTC 2017
Source: ruby2.3
Version: 2.3.3-1
Severity: grave
Tags: patch security upstream
Hi,
the following vulnerability was published for ruby2.3.
CVE-2017-0903[0]:
| RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a
| possible remote code execution vulnerability. YAML deserialization of
| gem specifications can bypass class white lists. Specially crafted
| serialized objects can possibly be used to escalate to remote code
| execution.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-0903
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0903
[1] http://www.openwall.com/lists/oss-security/2017/10/10/2
[2] https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49
Regards,
Salvatore
More information about the Secure-testing-team
mailing list