{"id":"MGASA-2017-0371","summary":"Updated ruby packages fix security vulnerabilities","details":"If a malicious format string which contains a precious specifier (*) is\npassed and a huge minus value is also passed to the specifier, buffer\nunderrun may be caused. In such situation, the result may contains heap,\nor the Ruby interpreter may crash (CVE-2017-0898).\n\nIf a malicious string is passed to the decode method of OpenSSL::ASN1,\nbuffer underrun may be caused and the Ruby interpreter may crash\n(CVE-2017-14033).\n\nThe generate method of JSON module optionally accepts an instance of\nJSON::Ext::Generator::State class. If a malicious instance is passed,\nthe result may include contents of heap (CVE-2017-14064).\n\nWhen using the Basic authentication of WEBrick, clients can pass an\narbitrary string as the user name. WEBrick outputs the passed user name\nintact to its log, then an attacker can inject malicious escape\nsequences to the log and dangerous control characters may be executed on\na victim’s terminal emulator (CVE-2017-10784).\n","modified":"2026-02-04T03:44:33.756479Z","published":"2017-10-18T20:19:34Z","related":["CVE-2017-0898","CVE-2017-10784","CVE-2017-14033","CVE-2017-14064"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0371.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=21678"},{"type":"REPORT","url":"https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/"},{"type":"REPORT","url":"https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"},{"type":"REPORT","url":"https://www.ruby-lang.org/en/news/2017/09/14/openssl-asn1-buffer-underrun-cve-2017-14033/"},{"type":"REPORT","url":"https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/"},{"type":"REPORT","url":"https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/UFJE2REXNRTPGIHSNPRSAWTVCLFMRJZT/"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/65IMHHGWAQTSEIF7HZMQVPVRGFTO7YA3/"}],"affected":[{"package":{"name":"ruby","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/ruby?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.0.p648-1.5.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0371.json"}},{"package":{"name":"ruby-json","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/ruby-json?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.1-3.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0371.json"}},{"package":{"name":"ruby","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/ruby?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.2.8-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0371.json"}},{"package":{"name":"ruby-json","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/ruby-json?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.8.3-3.1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0371.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}