CVE-2015-3900
Publication date 24 June 2015
Last updated 24 July 2024
Ubuntu priority
RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
Status
Package | Ubuntu Release | Status |
---|---|---|
jruby | ||
14.04 LTS trusty |
Not affected
|
|
libgems-ruby | ||
14.04 LTS trusty | Not in release | |
ruby1.8 | ||
14.04 LTS trusty | Not in release | |
ruby1.9.1 | ||
14.04 LTS trusty | Not in release | |
ruby2.1 | ||
14.04 LTS trusty | Not in release | |
ruby2.2 | ||
14.04 LTS trusty | Not in release | |
ruby2.3 | ||
14.04 LTS trusty | Not in release | |
rubygems | ||
14.04 LTS trusty | Not in release | |
Notes
tyhicks
rubygems is for users of ruby1.8. ruby1.9.1 and jruby ship an embedded rubygems.
seth-arnold
I have doubts this patch actually addresses DNS hijacking adequately; this may properly restrict SRV records, but what verifies subsequent lookups to ensure the returned IPs aren't under attacker control? Marking 'low' as a result.
Patch details
Package | Patch details |
---|---|
ruby2.1 | |
ruby2.2 | |
ruby2.3 |