From owner-svn-ports-head@freebsd.org Thu Mar 29 20:12:43 2018 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id F2D43F73404; Thu, 29 Mar 2018 20:12:42 +0000 (UTC) (envelope-from sunpoet@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id A20D082869; Thu, 29 Mar 2018 20:12:42 +0000 (UTC) (envelope-from sunpoet@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 9CE071ECA4; Thu, 29 Mar 2018 20:12:42 +0000 (UTC) (envelope-from sunpoet@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id w2TKCgDs004189; Thu, 29 Mar 2018 20:12:42 GMT (envelope-from sunpoet@FreeBSD.org) Received: (from sunpoet@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id w2TKCgOS004187; Thu, 29 Mar 2018 20:12:42 GMT (envelope-from sunpoet@FreeBSD.org) Message-Id: <201803292012.w2TKCgOS004187@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: sunpoet set sender to sunpoet@FreeBSD.org using -f From: Sunpoet Po-Chuan Hsieh Date: Thu, 29 Mar 2018 20:12:42 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r465925 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: sunpoet X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 465925 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.25 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Mar 2018 20:12:43 -0000 Author: sunpoet Date: Thu Mar 29 20:12:42 2018 New Revision: 465925 URL: https://svnweb.freebsd.org/changeset/ports/465925 Log: Document Ruby vulnerability Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Mar 29 20:08:58 2018 (r465924) +++ head/security/vuxml/vuln.xml Thu Mar 29 20:12:42 2018 (r465925) @@ -58,6 +58,93 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + ruby -- multiple vulnerabilities + + + ruby + 2.3.0,12.3.7,1 + 2.4.0,12.4.4,1 + 2.5.0,12.5.1,1 + + + + +

Ruby news:

+
+

CVE-2017-17742: HTTP response splitting in WEBrick

+

If a script accepts an external input and outputs it without + modification as a part of HTTP responses, an attacker can use newline + characters to deceive the clients that the HTTP response header is + stopped at there, and can inject fake HTTP responses after the newline + characters to show malicious contents to the clients.

+

CVE-2018-6914: Unintentional file and directory creation with + directory traversal in tempfile and tmpdir

+

Dir.mktmpdir method introduced by tmpdir library accepts the prefix + and the suffix of the directory which is created as the first parameter. + The prefix can contain relative directory specifiers "../", so this + method can be used to target any directory. So, if a script accepts an + external input as the prefix, and the targeted directory has + inappropriate permissions or the ruby process has inappropriate + privileges, the attacker can create a directory or a file at any + directory.

+

CVE-2018-8777: DoS by large request in WEBrick

+

If an attacker sends a large request which contains huge HTTP headers, + WEBrick try to process it on memory, so the request causes the + out-of-memory DoS attack.

+

CVE-2018-8778: Buffer under-read in String#unpack

+

String#unpack receives format specifiers as its parameter, and can + be specified the position of parsing the data by the specifier @. If a + big number is passed with @, the number is treated as the negative + value, and out-of-buffer read is occurred. So, if a script accepts an + external input as the argument of String#unpack, the attacker can read + data on heaps.

+

CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in + UNIXServer and UNIXSocket

+

UNIXServer.open accepts the path of the socket to be created at the + first parameter. If the path contains NUL (\0) bytes, this method + recognize that the path is completed before the NUL bytes. So, if a + script accepts an external input as the argument of this method, the + attacker can make the socket file in the unintentional path. And, + UNIXSocket.open also accepts the path of the socket to be created at + the first parameter without checking NUL bytes like UNIXServer.open. + So, if a script accepts an external input as the argument of this + method, the attacker can accepts the socket file in the unintentional + path.

+

CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte + in Dir

+

Dir.open, Dir.new, Dir.entries and Dir.empty? accept the path of the + target directory as their parameter. If the parameter contains NUL (\0) + bytes, these methods recognize that the path is completed before the + NUL bytes. So, if a script accepts an external input as the argument of + these methods, the attacker can make the unintentional directory + traversal.

+
+ +
+ + https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/ + https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/ + https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/ + https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/ + https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/ + https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/ + https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/ + https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/ + https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/ + CVE-2017-17742 + CVE-2018-6914 + CVE-2018-8777 + CVE-2018-8778 + CVE-2018-8779 + CVE-2018-8780 + + + 2018-03-28 + 2018-03-29 + +
+ node.js -- multiple vulnerabilities