MGASA-2017-0482

Source
https://advisories.mageia.org/MGASA-2017-0482.html
Import Source
https://advisories.mageia.org/MGASA-2017-0482.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0482
Related
Published
2017-12-31T15:14:43Z
Modified
2017-12-31T14:49:33Z
Summary
Updated ruby-RubyGems packages fix security vulnerabilities
Details

An ANSI escape sequence vulnerability (CVE-2017-0899).

A DoS vulnerability in the query command (CVE-2017-0900).

A vulnerability in the gem installer that allowed a malicious gem to overwrite arbitrary files (CVE-2017-0901).

A DNS request hijacking vulnerability (CVE-2017-0902).

An unsafe object deserialization vulnerability that allows an attacker to inject an instance of an object of their choosing in the target system. A clever attacker can inject an object that is able to interact with the system in such a way that will allow the attacker to execute arbitrary code (CVE-2017-0903).

References
Credits

Affected packages

Mageia:6 / ruby-RubyGems

Package

Name
ruby-RubyGems
Purl
pkg:rpm/mageia/ruby-RubyGems?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.8-7.1.mga6

Ecosystem specific

{
    "section": "core"
}

Mageia:5 / ruby-RubyGems

Package

Name
ruby-RubyGems
Purl
pkg:rpm/mageia/ruby-RubyGems?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.11-5.2.mga5

Ecosystem specific

{
    "section": "core"
}