RHSA-2018:3730-01 -- Redhat rh-ruby24-rubyID: oval:org.secpod.oval:def:504880 | Date: (C)2021-01-29 (M)2024-01-29 |
Class: PATCH | Family: unix |
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: rh-ruby24-ruby , rh-ruby24-rubygems , rh-ruby24-rubygem-bigdecimal , rh-ruby24-rubygem-openssl . Security Fix: * ruby: OpenSSL::X509::Name equality check does not work correctly * ruby: HTTP response splitting in WEBrick * ruby: DoS by large request in WEBrick * ruby: Buffer under-read in String#unpack * ruby: Unintentional directory traversal by poisoned NULL byte in Dir * ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives * rubygems: Path traversal when writing to a symlinked basedir outside of the root * rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML * rubygems: Improper verification of signatures in tarball allows to install mis-signed gem * rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL * rubygems: XSS vulnerability in homepage attribute when displayed via gem server * rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations * ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir * ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket * rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service For more details about the security issue, including the impact, a CVSS score, and other related information, refer to the CVE page listed in the References section.
Platform: |
Red Hat Enterprise Linux 7 |
Red Hat Enterprise Linux 6 |