Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1500488 - (CVE-2017-0903) CVE-2017-0903 rubygems: Unsafe object deserialization through YAML formatted gem specifications
CVE-2017-0903 rubygems: Unsafe object deserialization through YAML formatted ...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20171010,repor...
: Security
Depends On: 1500489 1500490 1500491 1500654 1509448 1509449 1509450 1509451 1534437 1534438 1534937 1534941
Blocks: 1500494
  Show dependency treegraph
 
Reported: 2017-10-10 13:54 EDT by Pedro Sampaio
Modified: 2018-03-26 06:24 EDT (History)
38 users (show)

See Also:
Fixed In Version: rubygems 2.6.14
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found where the rubygems module was vulnerable to an unsafe YAML deserialization when inspecting a gem. Applications inspecting gem files without installing them can be tricked to execute arbitrary code in the context of the ruby interpreter.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-12-19 04:58:34 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:3485 normal SHIPPED_LIVE Moderate: rh-ruby24-ruby security, bug fix, and enhancement update 2017-12-19 08:37:01 EST
Red Hat Product Errata RHSA-2018:0378 normal SHIPPED_LIVE Important: ruby security update 2018-02-28 20:06:17 EST
Red Hat Product Errata RHSA-2018:0583 None None None 2018-03-26 05:46 EDT
Red Hat Product Errata RHSA-2018:0585 None None None 2018-03-26 06:24 EDT

  None (edit)
Description Pedro Sampaio 2017-10-10 13:54:02 EDT
RubyGems version 2.0.0 to 2.6.13 is vulnerable to an unsafe object deserialization through a specially crafted YAML formatted gem specification that could lead to a remote code execution when parsed without safegards. Applications that process Gems on the server are impacted but not if rubygems is only used as a client.

References:

http://www.openwall.com/lists/oss-security/2017/10/10/2
Comment 1 Pedro Sampaio 2017-10-10 13:54:42 EDT
Created ruby193-rubygems tracking bugs for this issue:

Affects: openshift-1 [bug 1500491]


Created rubygems tracking bugs for this issue:

Affects: fedora-all [bug 1500489]
Affects: openshift-1 [bug 1500490]
Comment 2 Tomas Hoger 2017-10-11 05:46:34 EDT
Created ruby tracking bugs for this issue:

Affects: fedora-all [bug 1500654]
Comment 6 Cedric Buissart 2017-12-04 09:25:58 EST
External References:

http://blog.rubygems.org/2017/10/09/2.6.14-released.html
Comment 16 errata-xmlrpc 2017-12-19 03:39:01 EST
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS

Via RHSA-2017:3485 https://access.redhat.com/errata/RHSA-2017:3485
Comment 18 Cedric Buissart 2017-12-19 05:00:01 EST
Statement:

This issue did not affect the versions of rubygems as shipped with Red Hat Enterprise Linux 6.

This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7 and the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Comment 26 errata-xmlrpc 2018-02-28 15:03:12 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0378 https://access.redhat.com/errata/RHSA-2018:0378
Comment 28 errata-xmlrpc 2018-03-26 05:46:25 EDT
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS

Via RHSA-2018:0583 https://access.redhat.com/errata/RHSA-2018:0583
Comment 29 errata-xmlrpc 2018-03-26 06:24:31 EDT
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS

Via RHSA-2018:0585 https://access.redhat.com/errata/RHSA-2018:0585

Note You need to log in before you can comment on or make changes to this bug.