Affected versions: Ruby 2.2 series: 2.2.7 and earlier Ruby 2.3 series: 2.3.4 and earlier Ruby 2.4 series: 2.4.1 and earlier CVE-2017-0898: Buffer underrun vulnerability in Kernel.sprintf If a malicious format string which contains a precious specifier (*) is passed and a huge minus value is also passed to the specifier, buffer underrun may be caused. In such situation, the result may contains heap, or the Ruby interpreter may crash. CVE-2017-10784: Escape sequence injection vulnerability in the Basic authentication of WEBrick When using the Basic authentication of WEBrick, clients can pass an arbitrary string as the user name. WEBrick outputs the passed user name intact to its log, then an attacker can inject malicious escape sequences to the log and dangerous control characters may be executed on a victim’s terminal emulator. CVE-2017-14033: Buffer underrun vulnerability in OpenSSL ASN1 decode If a malicious string is passed to the decode method of OpenSSL::ASN1, buffer underrun may be caused and the Ruby interpreter may crash. CVE-2017-14064: Heap exposure vulnerability in generating JSON The generate method of JSON module optionally accepts an instance of JSON::Ext::Generator::State class. If a malicious instance is passed, the result may include contents of heap. This bug is already fixed in bug 629484
Fixed versions have been added: dev-lang/ruby-2.2.8 dev-lang/ruby-2.3.5 dev-lang/ruby-2.4.2 Only the 2.2 slot is stable, so we can proceed with marking dev-lang/ruby-2.2.8 stable.
Stable on alpha.
ia64 stable
hppa stable
arm stable
ppc64 stable
ppc stable
amd64 stable
x86 stable @ Maintainer(s): Please cleanup!
Vulnerable versions have been removed.
@security, please vote on GLSA, thank you.
This issue was resolved and addressed in GLSA 201710-18 at https://security.gentoo.org/glsa/201710-18 by GLSA coordinator Aaron Bauman (b-man).
sparc stable (thanks to Rolf Eike Beer)