Hi Antonio,

On Wed, Jul 29, 2015 at 08:46:16PM -0300, Antonio Terceiro wrote:
> 
> On Sat, Jun 27, 2015 at 10:23:31PM +0200, Christian Hofstaedtler wrote:
> > Salvatore,
> > 
> > * Salvatore Bonaccorso <car...@debian.org> [150627 13:57]:
> > > Source: ruby2.1
> > > Version: 2.1.5-1
> > > Severity: important
> > > Tags: security upstream patch fixed-upstream
> > > 
> > > the following vulnerability was published for ruby2.1.
> > > 
> > > CVE-2015-3900[0]:
> > > | RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before
> > > | 2.4.7 does not validate the hostname when fetching gems or making API
> > > | request, which allows remote attackers to redirect requests to
> > > | arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack
> > > | attack."
> > 
> > Thank you for bringing this to our attention. I suspect upstream
> > will upgrade to 2.2.5 (on the ruby 2.1 branch) in the next few days,
> > and then I'd like to import that, if nobody objects.
> 
> upstream didn't do that until now, so I want to upload the attached
> debdiff to jessie-security.
> 
> the ruby packages are maintained with patches applied in git, so the
> metadata is not visible in the debdiff. I applied these two commits,
> cherry-picked from rubygems upstream (funny enough that they apply
> cleanly on top of the ruby source):
> 
> http://anonscm.debian.org/cgit/collab-maint/ruby.git/commit/?h=debian/jessie&id=9b945cadc3b157829a60debff1dd5c536644f9b2
> http://anonscm.debian.org/cgit/collab-maint/ruby.git/commit/?h=debian/jessie&id=61f89c1e7b7ac864d840686aa7824eb04cba5cff
> 
> Salvatore, please let me know if I can upload to jessie-security.
> I will make similar uploads to unstable for both ruby2.1 and ruby2.2.

The debdiff itself looks good to me (btw, for security upload use
urgency=high for consistency). Looking at the security-tracker,
https://security-tracker.debian.org/tracker/CVE-2015-3900 we had
marked this as no-dsa with the following comment, 

[jessie] - ruby2.1 <no-dsa> (Minor issue, can be coupled with a future Ruby DSA)

So I suggest to either wait for a more urgent update for ruby2.1 to be
targeted via a jessie-security update or ask stable release managers
to schedule it via a jessie-pu.

Fine with you?

Btw, there is
https://security-tracker.debian.org/tracker/CVE-2009-5147 (but which
stil hass a TODO item, so needs to be checked if this affects ruby2.1
at all, so it as well has no decision yet about dsa/no-dsa).

Regards,
Salvatore

Attachment: signature.asc
Description: Digital signature

Reply via email to