[DRE-maint] Bug#902720: CVE-2018-1000544

Markus Koschany apo at debian.org
Wed Aug 15 11:33:30 BST 2018


Control: tags -1 pending

I have uploaded a security update to address CVE-2018-1000544. Please
find attached the debdiff.

Markus
-------------- next part --------------
diff -Nru ruby-zip-1.2.1/debian/changelog ruby-zip-1.2.1/debian/changelog
--- ruby-zip-1.2.1/debian/changelog	2017-06-27 20:18:00.000000000 +0200
+++ ruby-zip-1.2.1/debian/changelog	2018-08-13 13:57:54.000000000 +0200
@@ -1,3 +1,15 @@
+ruby-zip (1.2.1-1.1) unstable; urgency=medium
+
+  * Non-maintainer upload.
+  * Fix CVE-2018-1000544:
+    rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory
+    Traversal vulnerability that can be exploited to write arbitrary files to
+    the filesystem. (Closes: #902720)
+  * Drop CVE-2017-5946.patch because this one was already fixed in version
+    1.2.1.
+
+ -- Markus Koschany <apo at debian.org>  Mon, 13 Aug 2018 13:57:54 +0200
+
 ruby-zip (1.2.1-1) unstable; urgency=medium
 
   * Team upload
diff -Nru ruby-zip-1.2.1/debian/patches/CVE-2017-5946.patch ruby-zip-1.2.1/debian/patches/CVE-2017-5946.patch
--- ruby-zip-1.2.1/debian/patches/CVE-2017-5946.patch	2017-06-27 20:18:00.000000000 +0200
+++ ruby-zip-1.2.1/debian/patches/CVE-2017-5946.patch	1970-01-01 01:00:00.000000000 +0100
@@ -1,23 +0,0 @@
-From ce4208fdecc2ad079b05d3c49d70fe6ed1d07016 Mon Sep 17 00:00:00 2001
-From: Alexander Simonov <alex at simonov.me>
-Date: Wed, 8 Feb 2017 13:43:14 +0200
-Subject: [PATCH] Fix #315 and resolve relative path vulnerability
-
----
- lib/zip/entry.rb | 5 +++++
- 1 file changed, 5 insertions(+)
-
---- a/lib/zip/entry.rb
-+++ b/lib/zip/entry.rb
-@@ -155,6 +155,11 @@
-         return self
-       end
- 
-+      if @name.squeeze('/') =~ /\.{2}(?:\/|\z)/
-+        puts "WARNING: skipped \"../\" path component(s) in #{@name}"
-+        return self
-+      end
-+
-       if directory? || file? || symlink?
-         __send__("create_#{@ftype}", dest_path, &block)
-       else
Binärdateien /tmp/PnO56ihERK/ruby-zip-1.2.1/debian/patches/CVE-2018-1000544_part1.patch und /tmp/XzTwLOhW91/ruby-zip-1.2.1/debian/patches/CVE-2018-1000544_part1.patch sind verschieden.
Binärdateien /tmp/PnO56ihERK/ruby-zip-1.2.1/debian/patches/CVE-2018-1000544_part2.patch und /tmp/XzTwLOhW91/ruby-zip-1.2.1/debian/patches/CVE-2018-1000544_part2.patch sind verschieden.
diff -Nru ruby-zip-1.2.1/debian/patches/series ruby-zip-1.2.1/debian/patches/series
--- ruby-zip-1.2.1/debian/patches/series	2017-06-27 20:18:00.000000000 +0200
+++ ruby-zip-1.2.1/debian/patches/series	2018-08-13 13:57:54.000000000 +0200
@@ -1,4 +1,5 @@
 require-forwardable-fix-test.patch
 ignore-simplecov.diff
 fix-random-tests-failures
-CVE-2017-5946.patch
+CVE-2018-1000544_part1.patch
+CVE-2018-1000544_part2.patch
diff -Nru ruby-zip-1.2.1/debian/source/include-binaries ruby-zip-1.2.1/debian/source/include-binaries
--- ruby-zip-1.2.1/debian/source/include-binaries	1970-01-01 01:00:00.000000000 +0100
+++ ruby-zip-1.2.1/debian/source/include-binaries	2018-08-13 13:57:54.000000000 +0200
@@ -0,0 +1,2 @@
+debian/patches/CVE-2018-1000544_part1.patch
+debian/patches/CVE-2018-1000544_part2.patch
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 963 bytes
Desc: OpenPGP digital signature
URL: <http://alioth-lists.debian.net/pipermail/pkg-ruby-extras-maintainers/attachments/20180815/73edc7cd/attachment-0001.sig>


More information about the Pkg-ruby-extras-maintainers mailing list