Page Menu
Home
FreeBSD
Search
Configure Global Search
Log In
Files
F153457696
D2572.diff
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Flag For Later
Award Token
Size
2 KB
Referenced Files
None
Subscribers
None
D2572.diff
View Options
Index: devel/ruby-gems/Makefile
===================================================================
--- devel/ruby-gems/Makefile
+++ devel/ruby-gems/Makefile
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= gems
-PORTVERSION= 2.4.6
+PORTVERSION= 2.4.7
CATEGORIES= devel ruby
MASTER_SITES= http://production.cf.rubygems.org/rubygems/
PKGNAMEPREFIX= ${RUBY_PKGNAMEPREFIX}
Index: devel/ruby-gems/distinfo
===================================================================
--- devel/ruby-gems/distinfo
+++ devel/ruby-gems/distinfo
@@ -1,2 +1,2 @@
-SHA256 (ruby/rubygems-2.4.6.tgz) = 76d3f3b10aa824d23a511f098ab777c6473b98ffa733f7be4222408897b68db9
-SIZE (ruby/rubygems-2.4.6.tgz) = 447588
+SHA256 (ruby/rubygems-2.4.7.tgz) = 62fabf8b1a3009cf65f0fc9c2bad68754aa229780d7139232c4ca9f4708ad6ec
+SIZE (ruby/rubygems-2.4.7.tgz) = 447941
Index: security/vuxml/vuln.xml
===================================================================
--- security/vuxml/vuln.xml
+++ security/vuxml/vuln.xml
@@ -57,6 +57,48 @@
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="a0089e18-fc9e-11e4-bc58-001e67150279">
+ <topic>rubygems -- request hijacking vulnerability</topic>
+ <affects>
+ <package>
+ <name>ruby20-gems</name>
+ <range><lt>2.4.7</lt></range>
+ </package>
+ <package>
+ <name>ruby21-gems</name>
+ <range><lt>2.4.7</lt></range>
+ </package>
+ <package>
+ <name>ruby22-gems</name>
+ <range><lt>2.4.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jonathan Claudius reports:</p>
+ <blockquote cite="http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html">
+ <p>RubyGems provides the ability of a domain to direct clients to a
+ separate host that is used to fetch gems and make API calls against.
+ This mechanism is implemented via DNS, specificly a SRV record
+ _rubygems._tcp under the original requested domain.</p>
+ <p>RubyGems did not validate the hostname returned in the SRV record
+ before sending requests to it. This left clients open to a DNS
+ hijack attack, whereby an attacker could return a SRV of their
+ choosing and get the client to use it.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <freebsdpr>ports/200264</freebsdpr>
+ <cvename>CVE-2015-3900</cvename>
+ <url>http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html</url>
+ </references>
+ <dates>
+ <discovery>2015-05-14</discovery>
+ <entry>2015-05-17</entry>
+ </dates>
+ </vuln>
+
<vuln vid="2780e442-fc59-11e4-b18b-6805ca1d3bb1">
<topic>qemu -- possible VM escape and code execution ("VENOM")</topic>
<affects>
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Wed, Apr 22, 7:00 AM (14 h, 34 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
31960713
Default Alt Text
D2572.diff (2 KB)
Attached To
Mode
D2572: devel/ruby-gems: update to 2.4.7
Attached
Detach File
Event Timeline
Log In to Comment