Source: ruby2.3 Version: 2.3.3-1 Severity: grave Tags: patch security upstream
Hi, the following vulnerability was published for ruby2.3. CVE-2017-0903[0]: | RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a | possible remote code execution vulnerability. YAML deserialization of | gem specifications can bypass class white lists. Specially crafted | serialized objects can possibly be used to escalate to remote code | execution. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2017-0903 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0903 [1] http://www.openwall.com/lists/oss-security/2017/10/10/2 [2] https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49 Regards, Salvatore