ruby2.5: CVE-2017-17790: fixed command injection

Related Vulnerabilities: CVE-2017-17790   CVE-2017-17405  

Debian Bug report logs - #884878
ruby2.5: CVE-2017-17790: fixed command injection

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Wed, 20 Dec 2017 21:33:02 UTC

Severity: important

Tags: fixed-upstream, security, upstream

Found in version ruby2.5/2.5.0~preview1-1

Fixed in version ruby2.5/2.5.0-1

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Forwarded to https://github.com/ruby/ruby/pull/1777

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Antonio Terceiro <terceiro@debian.org>:
Bug#884878; Package src:ruby2.5. (Wed, 20 Dec 2017 21:33:05 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Antonio Terceiro <terceiro@debian.org>. (Wed, 20 Dec 2017 21:33:05 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: ruby2.5: CVE-2017-17790: fixed command injection
Date: Wed, 20 Dec 2017 22:31:24 +0100
Source: ruby2.5
Version: 2.5.0~preview1-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/ruby/ruby/pull/1777
Control: clone -1 -2
Control: reassign -2 ruby2.3 2.3.5-1
Control: found -2 2.3.3-1
Control: retitle -2 ruby2.3: CVE-2017-17790: fixed command injection

Hi,

the following vulnerability was published for ruby2.5.

CVE-2017-17790[0]:
| The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3
| uses Kernel#open, which might allow Command Injection attacks, as
| demonstrated by a Resolv::Hosts::new argument beginning with a '|'
| character, a different vulnerability than CVE-2017-17405. NOTE:
| situations with untrusted input may be highly unlikely.

As already mentioned in the CVE description, it's quite unlikely that
there is external input fed to Resolv::Hosts. But a fix can be
included in any future DSA as well.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-17790
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790
[1] https://github.com/ruby/ruby/pull/1777
[2] https://github.com/ruby/ruby/commit/e7464561b5151501beb356fc750d5dd1a88014f7

Regards,
Salvatore



Bug 884878 cloned as bug 884879 Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Wed, 20 Dec 2017 21:33:05 GMT) (full text, mbox, link).


Added tag(s) fixed-upstream. Request was from bts-link-upstream@lists.alioth.debian.org to control@bugs.debian.org. (Mon, 25 Dec 2017 17:03:24 GMT) (full text, mbox, link).


Marked as fixed in versions ruby2.5/2.5.0-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 25 Feb 2018 08:21:03 GMT) (full text, mbox, link).


Marked Bug as done Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Sun, 25 Feb 2018 16:18:05 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 25 Feb 2018 16:18:06 GMT) (full text, mbox, link).


Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#884878. (Sun, 25 Feb 2018 16:18:12 GMT) (full text, mbox, link).


Message #18 received at 884878-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 884878-submitter@bugs.debian.org
Subject: closing 884878
Date: Sun, 25 Feb 2018 17:14:42 +0100
close 884878 2.5.0-1
thanks




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Fri, 04 May 2018 07:30:20 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:10:39 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.