CVE-2017-0903

Priority
Description
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible
remote code execution vulnerability. YAML deserialization of gem
specifications can bypass class white lists. Specially crafted serialized
objects can possibly be used to escalate to remote code execution.
Notes
tyhicksruby{1.9.1,2.0,2.3} and jruby ship an embedded rubygems.
leosilvafollowing http://www.openwall.com/lists/oss-security/2017/10/10/2, versions < 2.0.0 of ruby
are not affected
Package
Source: jruby (LP Ubuntu Debian)
Upstream:released (0.1.17.0-1~18.04)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (0.1.17.0-1~18.04)
Ubuntu 19.04 (Disco Dingo):not-affected (0.1.17.0-1~18.04)
Ubuntu 19.10 (Eoan Ermine):not-affected (0.1.17.0-1~18.04)
Ubuntu 20.04 (Focal Fossa):not-affected (0.1.17.0-1~18.04)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [code not present])
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 (Focal Fossa):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was released [2.0.0.484-1ubuntu2.10])
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 (Focal Fossa):DNE
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (2.3.1-2~16.04.6)
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 19.04 (Disco Dingo):DNE
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 (Focal Fossa):DNE
More Information

Updated: 2019-12-05 19:37:48 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)