First published: Thu Nov 29 2018(Updated: )
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.<br>The following packages have been upgraded to a later upstream version: rh-ruby24-ruby (2.4.5), rh-ruby24-rubygems (2.6.14.3), rh-ruby24-rubygem-bigdecimal (1.3.2), rh-ruby24-rubygem-openssl (2.0.9). (BZ#1650590)<br>Security Fix(es):<br><li> ruby: OpenSSL::X509::Name equality check does not work correctly (CVE-2018-16395)</li> <li> ruby: HTTP response splitting in WEBrick (CVE-2017-17742)</li> <li> ruby: DoS by large request in WEBrick (CVE-2018-8777)</li> <li> ruby: Buffer under-read in String#unpack (CVE-2018-8778)</li> <li> ruby: Unintentional directory traversal by poisoned NULL byte in Dir (CVE-2018-8780)</li> <li> ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives (CVE-2018-16396)</li> <li> rubygems: Path traversal when writing to a symlinked basedir outside of the root (CVE-2018-1000073)</li> <li> rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (CVE-2018-1000074)</li> <li> rubygems: Improper verification of signatures in tarball allows to install mis-signed gem (CVE-2018-1000076)</li> <li> rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (CVE-2018-1000077)</li> <li> rubygems: XSS vulnerability in homepage attribute when displayed via gem server (CVE-2018-1000078)</li> <li> rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations (CVE-2018-1000079)</li> <li> ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (CVE-2018-6914)</li> <li> ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket (CVE-2018-8779)</li> <li> rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service (CVE-2018-1000075)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby24-ruby | <2.4.5-91.el7 | 2.4.5-91.el7 |
redhat/rh-ruby24-ruby | <2.4.5-91.el7 | 2.4.5-91.el7 |
redhat/rh-ruby24-ruby-debuginfo | <2.4.5-91.el7 | 2.4.5-91.el7 |
redhat/rh-ruby24-ruby-devel | <2.4.5-91.el7 | 2.4.5-91.el7 |
redhat/rh-ruby24-ruby-doc | <2.4.5-91.el7 | 2.4.5-91.el7 |
redhat/rh-ruby24-ruby-irb | <2.4.5-91.el7 | 2.4.5-91.el7 |
redhat/rh-ruby24-ruby-libs | <2.4.5-91.el7 | 2.4.5-91.el7 |
redhat/rh-ruby24-rubygem-bigdecimal | <1.3.2-91.el7 | 1.3.2-91.el7 |
redhat/rh-ruby24-rubygem-io-console | <0.4.6-91.el7 | 0.4.6-91.el7 |
redhat/rh-ruby24-rubygem-json | <2.0.4-91.el7 | 2.0.4-91.el7 |
redhat/rh-ruby24-rubygem-minitest | <5.10.1-91.el7 | 5.10.1-91.el7 |
redhat/rh-ruby24-rubygem-net-telnet | <0.1.1-91.el7 | 0.1.1-91.el7 |
redhat/rh-ruby24-rubygem-openssl | <2.0.9-91.el7 | 2.0.9-91.el7 |
redhat/rh-ruby24-rubygem-psych | <2.2.2-91.el7 | 2.2.2-91.el7 |
redhat/rh-ruby24-rubygem-rake | <12.0.0-91.el7 | 12.0.0-91.el7 |
redhat/rh-ruby24-rubygem-rdoc | <5.0.0-91.el7 | 5.0.0-91.el7 |
redhat/rh-ruby24-rubygem-test-unit | <3.2.3-91.el7 | 3.2.3-91.el7 |
redhat/rh-ruby24-rubygem-xmlrpc | <0.2.1-91.el7 | 0.2.1-91.el7 |
redhat/rh-ruby24-rubygems | <2.6.14.3-91.el7 | 2.6.14.3-91.el7 |
redhat/rh-ruby24-rubygems-devel | <2.6.14.3-91.el7 | 2.6.14.3-91.el7 |
redhat/rh-ruby24-ruby | <2.4.5-91.el6 | 2.4.5-91.el6 |
redhat/rh-ruby24-ruby | <2.4.5-91.el6 | 2.4.5-91.el6 |
redhat/rh-ruby24-ruby-debuginfo | <2.4.5-91.el6 | 2.4.5-91.el6 |
redhat/rh-ruby24-ruby-devel | <2.4.5-91.el6 | 2.4.5-91.el6 |
redhat/rh-ruby24-ruby-doc | <2.4.5-91.el6 | 2.4.5-91.el6 |
redhat/rh-ruby24-ruby-irb | <2.4.5-91.el6 | 2.4.5-91.el6 |
redhat/rh-ruby24-ruby-libs | <2.4.5-91.el6 | 2.4.5-91.el6 |
redhat/rh-ruby24-rubygem-bigdecimal | <1.3.2-91.el6 | 1.3.2-91.el6 |
redhat/rh-ruby24-rubygem-io-console | <0.4.6-91.el6 | 0.4.6-91.el6 |
redhat/rh-ruby24-rubygem-json | <2.0.4-91.el6 | 2.0.4-91.el6 |
redhat/rh-ruby24-rubygem-minitest | <5.10.1-91.el6 | 5.10.1-91.el6 |
redhat/rh-ruby24-rubygem-net-telnet | <0.1.1-91.el6 | 0.1.1-91.el6 |
redhat/rh-ruby24-rubygem-openssl | <2.0.9-91.el6 | 2.0.9-91.el6 |
redhat/rh-ruby24-rubygem-psych | <2.2.2-91.el6 | 2.2.2-91.el6 |
redhat/rh-ruby24-rubygem-rake | <12.0.0-91.el6 | 12.0.0-91.el6 |
redhat/rh-ruby24-rubygem-rdoc | <5.0.0-91.el6 | 5.0.0-91.el6 |
redhat/rh-ruby24-rubygem-test-unit | <3.2.3-91.el6 | 3.2.3-91.el6 |
redhat/rh-ruby24-rubygem-xmlrpc | <0.2.1-91.el6 | 0.2.1-91.el6 |
redhat/rh-ruby24-rubygems | <2.6.14.3-91.el6 | 2.6.14.3-91.el6 |
redhat/rh-ruby24-rubygems-devel | <2.6.14.3-91.el6 | 2.6.14.3-91.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.