Skip to content

Commit 58a0ebf

Browse files
indirectduckinator
andauthored
Commit suggestions from @duckinator
Co-authored-by: Ellen Marie Dash <the@smallest.dog>
1 parent a042f4f commit 58a0ebf

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

_posts/2024-03-31-rubygems-and-xz.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -5,19 +5,19 @@ author: Samuel Giddins
55
author_email: segiddins@segiddins.me
66
---
77

8-
The past few days have seen the security world focused on the revelation of the [xy/liblzma backdoor](https://xeiaso.net/notes/2024/xz-vuln/), which has been assigned [CVE-2024-3094](https://nvd.nist.gov/vuln/detail/CVE-2024-3094).
8+
The past few days have seen the security world focused on the revelation of the [xz/liblzma backdoor](https://xeiaso.net/notes/2024/xz-vuln/), which has been assigned [CVE-2024-3094](https://nvd.nist.gov/vuln/detail/CVE-2024-3094).
99

1010
In response to this, I have undertaken an exposure assesment of the vulnerability on RubyGems.org and the broader RubyGems ecosystem.
11-
I am happy to report that RubyGems.org is not vulnerable to this issue, as we use a `musl` based operating system (Alpine) for our RubyGems.org containers.
11+
I am happy to report that RubyGems.org is not vulnerable to this issue, as our servers use a `musl` based operating system (Alpine).
1212

1313
Furthermore, I am happy to confirm that there is no evidence that gems in the RubyGems ecosystem have been used as an attack vector for this vulnerability.
1414
Thanks to the data consolidated in the [rubygems-research](https://github.com/segiddins/rubygems-research) project (available publicly at [research.rubygems.info](https://research.rubygems.info)), we can confirm that no gems contain any references to the vulnerable `liblzma` library.
1515

1616
I would like to thank the rest of the RubyGems.org security team for their support in this investigation, and for their continued dedication to the security of the ecosystem. I would also like to thank AWS for their continued support of RubyGems security, sponsoring myself as [Ruby Central's security engineer in residence](https://rubycentral.org/news/ruby-central-welcomes-new-software-engineer-in-residence-sponsored-by-aws/), and funding the development of the [rubygems-research](https://github.com/segiddins/rubygems-research) project, which proved instrumental in confirming the absence of `liblzma` across all million and a half gem versions hosted on RubyGems.org.
1717

18-
## Nitty Gritty Details
18+
## Details
1919

20-
RubyGems.org app containers do not contain any vulnerable versions of `liblzma` nor `xz` (in addition to the fact that they run Alpine and thus were not vulnerable to the backdoor).
20+
RubyGems.org app containers do not contain any vulnerable versions of `liblzma` nor `xz`. In addition, they run Alpine which is not vulnerable to the backdoor.
2121

2222
```
2323
web-7b88594bd9-6g5nn:/app find / -name '*lzma*'
@@ -36,7 +36,7 @@ web-7b88594bd9-6g5nn:/app# find / -name '*xz*'
3636
/app/vendor/ruby/3.3.0/gems/bindata-2.5.0/lib/bindata/transform/xz.rb
3737
```
3838

39-
No ecosystem gems contain a vulnerable `liblzma.so`.
39+
As of March 31st 2024, no gems on RubyGems.org contain a vulnerable `liblzma.so`.
4040

4141
```irb
4242
irb(main):005> attrs = ['version_data_entries.full_name', 'rubygems.name', 'versions.number', 'versions.platform', 'versions.uploaded_at']

0 commit comments

Comments
 (0)