-
-
Notifications
You must be signed in to change notification settings - Fork 225
GHSA SYNC: 2 modified advisories; 3 brand new advisories #957
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
postmodern
merged 6 commits into
rubysec:master
from
jasnow:ghsa-syncbot-2026-01-12-19_34_57
Jan 13, 2026
Merged
Changes from all commits
Commits
Show all changes
6 commits
Select commit
Hold shift + click to select a range
5af4971
GHSA SYNC: 2 modified advisories; 4 brand new advisories
jasnow 2c106a3
Fix typo in the `title:` of CVE-2011-4121.yml
postmodern 74adf68
Change URL for CVE-2011-4121 to NVD
jasnow 54e11e9
Update CVE-2016-2337 URL to NVD
jasnow b0101aa
Change CVE-2016-2338 URL to NVD
jasnow 182e956
Change CVE-2016-2339 URL to NVD
jasnow File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,31 @@ | ||
| --- | ||
| engine: ruby | ||
| cve: 2011-4121 | ||
| ghsa: mjg4-5rfj-952f | ||
| url: https://nvd.nist.gov/vuln/detail/CVE-2011-4121 | ||
| title: Private Ruby OpenSSL RSA key generation is always "1" | ||
| date: 2019-11-26 | ||
| description: | | ||
| The OpenSSL extension of Ruby (Git trunk) versions after | ||
| 2011-09-01 up to 2011-11-03 always generated an exponent value | ||
| of '1' to be used for private RSA key generation. A remote | ||
| attacker could use this flaw to bypass or corrupt integrity | ||
| of services, depending on strong private RSA keys generation | ||
| mechanism. | ||
|
|
||
| - "The fix was introduced via SVN revision 33633, resolving | ||
| the faulty random exponent generation." | ||
| - "fix was integrated into the Ruby 1.9.3 series" | ||
| cvss_v2: 7.5 | ||
| cvss_v3: 9.8 | ||
| patched_versions: | ||
| - ">= 1.9.3" | ||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2011-4121 | ||
| - https://github.com/saltstack/salt/commit/5dd304276ba5745ec21fc1e6686a0b28da29e6fc | ||
| - https://access.redhat.com/security/cve/cve-2011-4121 | ||
| - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-4121 | ||
| - https://security-tracker.debian.org/tracker/CVE-2011-4121 | ||
| - http://www.openwall.com/lists/oss-security/2013/07/01/1 | ||
| - https://github.com/advisories/GHSA-mjg4-5rfj-952f |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,22 @@ | ||
| --- | ||
| engine: ruby | ||
| cve: 2016-2337 | ||
| ghsa: f58m-77qc-8gjv | ||
| url: https://nvd.nist.gov/vuln/detail/CVE-2016-2337 | ||
| title: Type confusion exists in _cancel_eval Ruby's TclTkIp class | ||
| date: 2017-01-06 | ||
| description: | | ||
| Type confusion exists in _cancel_eval Ruby's TclTkIp class method. | ||
| Attacker passing different type of object than String as "retval" | ||
| argument can cause arbitrary code execution. | ||
| cvss_v3: 9.8 | ||
| cvss_v4: 7.5 | ||
| patched_versions: | ||
| - ">= 2.2.8" | ||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2016-2337 | ||
| - https://lists.debian.org/debian-lts-announce/2018/08/msg00028.html | ||
| - https://security.gentoo.org/glsa/201710-18 | ||
| - http://www.talosintelligence.com/reports/TALOS-2016-0031 | ||
| - https://github.com/advisories/GHSA-f58m-77qc-8gjv | ||
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,31 @@ | ||
| --- | ||
| engine: ruby | ||
| cve: 2016-2338 | ||
| ghsa: r46x-xjwr-8v2g | ||
| url: https://nvd.nist.gov/vuln/detail/CVE-2016-2338 | ||
| title: Exploitable heap overflow vulnerability exists | ||
| in Ruby's Psych::Emitter start_document function | ||
| date: 2022-09-28 | ||
| description: | | ||
| An exploitable heap overflow vulnerability exists in the | ||
| Psych::Emitter start_document function of Ruby. In Psych::Emitter | ||
| start_document function heap buffer "head" allocation is made | ||
| based on tags array length. Specially constructed object passed | ||
| as element of tags array can increase this array size after | ||
| mentioned allocation and cause heap overflow. | ||
|
|
||
| - "Ruby versions 2.2.2 (4/13/2015) and 2.3.0 (12/25/2015) | ||
| are susceptible" | ||
| cvss_v3: 9.8 | ||
| patched_versions: | ||
| - "~> 2.3.1" | ||
| - ">= 2.4.0" | ||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2016-2338 | ||
| - https://lists.debian.org/debian-lts-announce/2020/03/msg00032.html | ||
| - http://www.talosintelligence.com/reports/TALOS-2016-0032 | ||
| - https://security.netapp.com/advisory/ntap-20221228-0005 | ||
| - https://cve.reconshell.com/cve/CVE-2016-2338 | ||
| - https://alas.aws.amazon.com/AL2/ALAS2-2025-2990.html | ||
| - https://github.com/advisories/GHSA-r46x-xjwr-8v2g |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,33 @@ | ||
| --- | ||
| engine: ruby | ||
| cve: 2016-2339 | ||
| ghsa: c4w7-m676-pcvp | ||
| url: https://nvd.nist.gov/vuln/detail/CVE-2016-2339 | ||
| title: Ruby 2.1 has exploitable heap overflow vulnerability | ||
| date: 2017-01-06 | ||
| description: | | ||
| An exploitable heap overflow vulnerability exists in the | ||
| Fiddle::Function.new "initialize" function functionality of | ||
| Ruby. In Fiddle::Function.new "initialize" heap buffer | ||
| "arg_types" allocation is made based on args array length. | ||
| Specially constructed object passed as element of args array | ||
| can increase this array size after mentioned allocation and | ||
| cause heap overflow. | ||
|
|
||
| Versions affected: | ||
| - Ruby "2.0.0-p648, 2.1.0-p0 through 2.1.9, and 2.2.0 through 2.2.5." | ||
| - NOTE: Unclear where the patches where applied. | ||
| - "Fix was introduced in Ruby 2.1.9, with related packages like | ||
| ruby2.1 updated to version 2.1.9-19.3.2 or newer" | ||
| cvss_v3: 9.8 | ||
| patched_versions: | ||
| - ">= 2.1.9" | ||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2016-2339 | ||
| - https://app.opencve.io/cve/CVE-2016-2339 | ||
| - http://www.talosintelligence.com/reports/TALOS-2016-0034 | ||
| - https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html | ||
| - https://web.archive.org/web/20210123144757/https://www.securityfocus.com/bid/91234 | ||
| - https://www.cybersecurity-help.cz/vulnerabilities/39952/ | ||
| - https://github.com/advisories/GHSA-c4w7-m676-pcvp |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,18 +1,37 @@ | ||
| --- | ||
| engine: ruby | ||
| cve: 2022-28738 | ||
| ghsa: 8pqg-8p79-j5j8 | ||
| url: https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/ | ||
| title: Double free in Regexp compilation | ||
| date: 2022-04-12 | ||
| description: | | ||
| A double-free vulnerability is discovered in Regexp compilation. This vulnerability has been assigned the CVE identifier CVE-2022-28738. We strongly recommend upgrading Ruby. | ||
| A double-free vulnerability is discovered in Regexp compilation. This | ||
| vulnerability has been assigned the CVE identifier CVE-2022-28738. | ||
| We strongly recommend upgrading Ruby. | ||
|
|
||
| Due to a bug in the Regexp compilation process, creating a Regexp object with a crafted source string could cause the same memory to be freed twice. This is known as a “double free” vulnerability. Note that, in general, it is considered unsafe to create and use a Regexp object generated from untrusted input. In this case, however, following a comprehensive assessment, we treat this issue as a vulnerability. | ||
| Due to a bug in the Regexp compilation process, creating a Regexp | ||
| object with a crafted source string could cause the same memory to | ||
| be freed twice. This is known as a “double free” vulnerability. Note | ||
| that, in general, it is considered unsafe to create and use a Regexp | ||
| object generated from untrusted input. In this case, however, | ||
| following a comprehensive assessment, we treat this issue as a vulnerability. | ||
|
|
||
| Please update Ruby to 3.0.4, or 3.1.2. | ||
| Please update Ruby to 3.0.4 or 3.1.2. | ||
| cvss_v2: 7.5 | ||
| cvss_v3: 9.8 | ||
| patched_versions: | ||
| - "~> 3.0.4" | ||
| - ">= 3.1.2" | ||
| unaffected_versions: | ||
| - "~> 2.6.0" | ||
| - "~> 2.7.0" | ||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2022-28738 | ||
| - https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738 | ||
| - https://hackerone.com/reports/1220911 | ||
| - https://security-tracker.debian.org/tracker/CVE-2022-28738 | ||
| - https://security.netapp.com/advisory/ntap-20220624-0002 | ||
| - https://security.gentoo.org/glsa/202401-27 | ||
| - https://github.com/advisories/GHSA-8pqg-8p79-j5j8 |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.