Description
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1352-1 | jruby security update |
Debian DLA |
DLA-1480-1 | ruby2.1 security update |
Debian DLA |
DLA-1796-1 | jruby security update |
Debian DSA |
DSA-4219-1 | jruby security update |
Debian DSA |
DSA-4259-1 | ruby2.3 security update |
EUVD |
EUVD-2022-4983 | RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6. |
Github GHSA |
GHSA-qj2w-mw2r-pv39 | RubyGems Deserialization of Untrusted Data vulnerability |
Ubuntu USN |
USN-3621-1 | Ruby vulnerabilities |
Ubuntu USN |
USN-3621-2 | Ruby regression |
Ubuntu USN |
USN-3685-1 | Ruby vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T12:33:49.164Z
Reserved: 2018-02-21T00:00:00.000Z
Link: CVE-2018-1000074
No data.
Status : Modified
Published: 2018-03-13T15:29:00.487
Modified: 2024-11-21T03:39:34.760
Link: CVE-2018-1000074
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN