First published: Tue Feb 18 2020(Updated: )
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.<br>Security Fix(es):<br><li> ruby: DoS by large request in WEBrick (CVE-2018-8777)</li> <li> ruby: Unintentional directory traversal by poisoned NULL byte in Dir (CVE-2018-8780)</li> <li> rubygems: Path traversal when writing to a symlinked basedir outside of the root (CVE-2018-1000073)</li> <li> rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (CVE-2018-1000074)</li> <li> rubygems: Improper verification of signatures in tarball allows to install mis-signed gem (CVE-2018-1000076)</li> <li> rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (CVE-2018-1000077)</li> <li> rubygems: XSS vulnerability in homepage attribute when displayed via gem server (CVE-2018-1000078)</li> <li> rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations (CVE-2018-1000079)</li> <li> rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service (CVE-2018-1000075)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ruby | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-debuginfo | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-debuginfo | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-devel | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-doc | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-irb | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-libs | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-libs | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-tcltk | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/rubygem-bigdecimal | <1.2.0-35.el7_5 | 1.2.0-35.el7_5 |
redhat/rubygem-io-console | <0.4.2-35.el7_5 | 0.4.2-35.el7_5 |
redhat/rubygem-json | <1.7.7-35.el7_5 | 1.7.7-35.el7_5 |
redhat/rubygem-minitest | <4.3.2-35.el7_5 | 4.3.2-35.el7_5 |
redhat/rubygem-psych | <2.0.0-35.el7_5 | 2.0.0-35.el7_5 |
redhat/rubygem-rake | <0.9.6-35.el7_5 | 0.9.6-35.el7_5 |
redhat/rubygem-rdoc | <4.0.0-35.el7_5 | 4.0.0-35.el7_5 |
redhat/rubygems | <2.0.14.1-35.el7_5 | 2.0.14.1-35.el7_5 |
redhat/rubygems-devel | <2.0.14.1-35.el7_5 | 2.0.14.1-35.el7_5 |
redhat/ruby-devel | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-tcltk | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/rubygem-bigdecimal | <1.2.0-35.el7_5 | 1.2.0-35.el7_5 |
redhat/rubygem-io-console | <0.4.2-35.el7_5 | 0.4.2-35.el7_5 |
redhat/rubygem-json | <1.7.7-35.el7_5 | 1.7.7-35.el7_5 |
redhat/rubygem-psych | <2.0.0-35.el7_5 | 2.0.0-35.el7_5 |
redhat/ruby | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-debuginfo | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-devel | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-libs | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/ruby-tcltk | <2.0.0.648-35.el7_5 | 2.0.0.648-35.el7_5 |
redhat/rubygem-bigdecimal | <1.2.0-35.el7_5 | 1.2.0-35.el7_5 |
redhat/rubygem-io-console | <0.4.2-35.el7_5 | 0.4.2-35.el7_5 |
redhat/rubygem-json | <1.7.7-35.el7_5 | 1.7.7-35.el7_5 |
redhat/rubygem-psych | <2.0.0-35.el7_5 | 2.0.0-35.el7_5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.