Bug 814718 (CVE-2012-2125, CVE-2012-2126) - CVE-2012-2125 CVE-2012-2126 rubygems: Two security fixes in v1.8.23
Summary: CVE-2012-2125 CVE-2012-2126 rubygems: Two security fixes in v1.8.23
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-2125, CVE-2012-2126
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 814724 814725 814759 847393 903992 988679 1002838 1002839 1002841 1002842 1002843
Blocks: 814763 869077 1034635
TreeView+ depends on / blocked
 
Reported: 2012-04-20 14:22 UTC by Jan Lieskovsky
Modified: 2021-02-24 12:39 UTC (History)
11 users (show)

Fixed In Version: rubygem 1.8.23
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-09-18 20:35:05 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:1203 0 normal SHIPPED_LIVE Moderate: rubygems security update 2013-09-04 21:59:02 UTC
Red Hat Product Errata RHSA-2013:1441 0 normal SHIPPED_LIVE Moderate: rubygems security update 2013-10-17 21:18:53 UTC
Red Hat Product Errata RHSA-2013:1852 0 normal SHIPPED_LIVE Moderate: Red Hat Enterprise MRG Grid 2.4 security update 2013-12-17 23:36:36 UTC

Description Jan Lieskovsky 2012-04-20 14:22:50 UTC
Two security flaws were corrected in upstream rubygems v1.8.23 version:
#1 RubyGems now disallows redirection from HTTPS to HTTP,
#2 RubyGems now verifies SSL connections.

References:
[1] https://github.com/rubygems/rubygems/blob/1.8/History.txt

Upstream patch:
[2] https://github.com/rubygems/rubygems/commit/d4c7eafb8efe1e13a7abf5be5a5b4548870b15b7

Comment 1 Jan Lieskovsky 2012-04-20 14:35:32 UTC
These issues affect the versions of the rubygems package, as shipped with Red Hat Enterprise Linux 6.

--

These issues affect the versions of the rubygems package, as shipped with Fedora release of 15 and 16. Please schedule the updates.

--

These issues affect the version of the rubygems package, as shipped with Fedora EPEL 5. Please schedule the update.

Comment 2 Jan Lieskovsky 2012-04-20 14:36:49 UTC
Created rubygems tracking bugs for this issue

Affects: fedora-all [bug 814724]
Affects: epel-5 [bug 814725]

Comment 6 Jan Lieskovsky 2012-04-20 15:03:21 UTC
CVE Request:
[3] http://www.openwall.com/lists/oss-security/2012/04/20/23

Comment 7 Jan Lieskovsky 2012-04-20 15:20:08 UTC
Created jruby tracking bugs for this issue

Affects: fedora-16 [bug 814759]

Comment 8 Jan Lieskovsky 2012-04-20 15:20:55 UTC
These issues affect the version of the jruby package, as shipped with Fedora release of 16. Please schedule an update.

Comment 9 Jan Lieskovsky 2012-04-22 17:46:09 UTC
The CVE identifier of CVE-2012-2125 has been assigned to the:
* #1 RubyGems now disallows redirection from HTTPS to HTTP.

issue and identifier of CVE-2012-2126 has been assigned to the:
* #2 RubyGems now verifies SSL connections.

issue:
http://www.openwall.com/lists/oss-security/2012/04/20/24

Comment 10 David Jorm 2012-04-26 03:28:28 UTC
JBoss Enterprise SOA Platform includes jruby.jar as part of the scripting_chain quickstart. It is only deployed if you use this quickstart. jruby.jar does not include rubygems; this is provided by another component of the jruby distribution which is not included by JBoss Enterprise SOA Platform. Therefore JBoss Enterprise SOA Platform is not affected by these flaws in rubygems.

Comment 11 Fedora Update System 2012-05-01 00:52:22 UTC
rubygems-1.7.2-5.fc15 has been pushed to the Fedora 15 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 12 Fedora Update System 2012-05-01 00:52:39 UTC
rubygems-1.8.11-3.fc16.1 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 13 Fedora Update System 2012-05-02 04:45:47 UTC
rubygems-1.8.23-20.fc17 has been pushed to the Fedora 17 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 17 Kurt Seifried 2013-07-26 07:43:38 UTC
Statement:

The Red Hat Security Response Team has rated this issue as having moderate security impact in CloudForms 1.1. This issue is not currently planned to be addressed in future updates.

Comment 18 errata-xmlrpc 2013-09-04 18:00:55 UTC
This issue has been addressed in following products:

  RHEL 6 Version of OpenShift Enterprise 1.2

Via RHSA-2013:1203 https://rhn.redhat.com/errata/RHSA-2013-1203.html

Comment 19 errata-xmlrpc 2013-10-17 17:20:25 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:1441 https://rhn.redhat.com/errata/RHSA-2013-1441.html

Comment 21 errata-xmlrpc 2013-12-17 18:38:55 UTC
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2013:1852 https://rhn.redhat.com/errata/RHSA-2013-1852.html

Comment 24 Kurt Seifried 2014-09-18 20:35:05 UTC
SAM-1 uses rubygems as a dependency and does not directly download or install additional ruby gems once installed.


Note You need to log in before you can comment on or make changes to this bug.