UBUNTU-CVE-2017-0903

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2017-0903
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-0903.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-0903
Related
Published
2017-10-11T00:00:00Z
Modified
2017-10-11T00:00:00Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

References

Affected packages

Ubuntu:14.04:LTS / ruby2.0

Package

Name
ruby2.0
Purl
pkg:deb/ubuntu/ruby2.0@2.0.0.484-1ubuntu2.10?arch=src?distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.0.484-1ubuntu2.10

Affected versions

2.*

2.0.0.299-2
2.0.0.343-1
2.0.0.343-1ubuntu1
2.0.0.353-1
2.0.0.353-1ubuntu1
2.0.0.484-1ubuntu1
2.0.0.484-1ubuntu2
2.0.0.484-1ubuntu2.1
2.0.0.484-1ubuntu2.2
2.0.0.484-1ubuntu2.4
2.0.0.484-1ubuntu2.5
2.0.0.484-1ubuntu2.6
2.0.0.484-1ubuntu2.8
2.0.0.484-1ubuntu2.9

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "libruby2.0-dbgsym": "2.0.0.484-1ubuntu2.10",
            "libruby2.0": "2.0.0.484-1ubuntu2.10",
            "ruby2.0-tcltk-dbgsym": "2.0.0.484-1ubuntu2.10",
            "ruby2.0-doc": "2.0.0.484-1ubuntu2.10",
            "ruby2.0-dev": "2.0.0.484-1ubuntu2.10",
            "ruby2.0-dbgsym": "2.0.0.484-1ubuntu2.10",
            "ruby2.0-tcltk": "2.0.0.484-1ubuntu2.10",
            "ruby2.0": "2.0.0.484-1ubuntu2.10"
        }
    ]
}

Ubuntu:Pro:14.04:LTS / jruby

Package

Name
jruby

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.5.6-5ubuntu1
1.5.6-6
1.5.6-7
1.5.6-9+deb8u2build0.14.04.1~esm2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:16.04:LTS / ruby2.3

Package

Name
ruby2.3
Purl
pkg:deb/ubuntu/ruby2.3@2.3.1-2~16.04.6?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.1-2~16.04.6

Affected versions

2.*

2.3.0-1
2.3.0-2
2.3.0-4ubuntu2
2.3.0-4ubuntu3
2.3.0-5ubuntu1
2.3.1-2~16.04
2.3.1-2~16.04.2
2.3.1-2~16.04.4
2.3.1-2~16.04.5

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "libruby2.3-dbgsym": "2.3.1-2~16.04.6",
            "ruby2.3-tcltk": "2.3.1-2~16.04.6",
            "ruby2.3-dev-dbgsym": "2.3.1-2~16.04.6",
            "libruby2.3-dbg": "2.3.1-2~16.04.6",
            "ruby2.3-dev": "2.3.1-2~16.04.6",
            "ruby2.3-dbgsym": "2.3.1-2~16.04.6",
            "libruby2.3": "2.3.1-2~16.04.6",
            "ruby2.3-tcltk-dbgsym": "2.3.1-2~16.04.6",
            "ruby2.3": "2.3.1-2~16.04.6",
            "ruby2.3-doc": "2.3.1-2~16.04.6"
        }
    ]
}

Ubuntu:Pro:16.04:LTS / jruby

Package

Name
jruby

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.21-2ubuntu4
1.7.22-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / jruby

Package

Name
jruby
Purl
pkg:deb/ubuntu/jruby@9.3.9.0+ds-1?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.3.9.0+ds-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "jruby": "9.3.9.0+ds-1"
        }
    ]
}