Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:1570-1

Опубликовано: 09 июн. 2020
Источник: suse-cvrf

Описание

Security update for ruby2.1

This update for ruby2.1 fixes the following issues:

Security issues fixed:

  • CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
  • CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
  • CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
  • CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
  • CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
  • CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
  • CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
  • CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
  • CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
  • CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
  • CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
  • CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
  • CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
  • CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
  • CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
  • CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
  • CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
  • CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
  • CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
  • CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
  • CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
  • CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
  • CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
  • CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
  • CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
  • CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
  • CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
  • CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
  • CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
  • CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
  • CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
  • CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
  • CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
  • CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
  • CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
  • CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
  • CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
  • CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
  • CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
  • CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
  • CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

  • Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)

Список пакетов

HPE Helion OpenStack 8
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-EC2-HVM-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-GCE-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-OCI-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-SAP-Azure
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-SAP-Azure-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-SAP-Azure-LI-BYOS-Production
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-SAP-Azure-VLI-BYOS-Production
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-SAP-EC2-HVM
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-SAP-EC2-HVM-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-SAP-GCE
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-SAP-GCE-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-SAP-OCI-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-Azure-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-Azure-Basic-On-Demand
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-Azure-HPC-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-Azure-HPC-On-Demand
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-Azure-SAP-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-Azure-SAP-On-Demand
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-Azure-Standard-On-Demand
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-EC2-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-EC2-ECS-On-Demand
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-EC2-On-Demand
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-EC2-SAP-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-EC2-SAP-On-Demand
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-GCE-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-GCE-On-Demand
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-GCE-SAP-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-GCE-SAP-On-Demand
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-OCI-BYOS-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-OCI-BYOS-SAP-BYOS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-SAP-Azure-LI-BYOS-Production
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
SUSE Enterprise Storage 5
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
SUSE Linux Enterprise Server 12 SP2-BCL
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
yast2-ruby-bindings-3.1.53-9.8.1
SUSE Linux Enterprise Server 12 SP2-LTSS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
yast2-ruby-bindings-3.1.53-9.8.1
SUSE Linux Enterprise Server 12 SP3-BCL
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
SUSE Linux Enterprise Server 12 SP3-LTSS
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
SUSE Linux Enterprise Server 12 SP4
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
SUSE Linux Enterprise Server 12 SP5
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
SUSE Linux Enterprise Server for SAP Applications 12 SP2
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
yast2-ruby-bindings-3.1.53-9.8.1
SUSE Linux Enterprise Server for SAP Applications 12 SP3
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
SUSE Linux Enterprise Server for SAP Applications 12 SP4
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
SUSE Linux Enterprise Server for SAP Applications 12 SP5
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
SUSE Linux Enterprise Software Development Kit 12 SP4
ruby2.1-devel-2.1.9-19.3.2
SUSE Linux Enterprise Software Development Kit 12 SP5
ruby2.1-devel-2.1.9-19.3.2
SUSE OpenStack Cloud 7
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
yast2-ruby-bindings-3.1.53-9.8.1
SUSE OpenStack Cloud 8
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2
SUSE OpenStack Cloud Crowbar 8
libruby2_1-2_1-2.1.9-19.3.2
ruby2.1-2.1.9-19.3.2
ruby2.1-stdlib-2.1.9-19.3.2

Описание

Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

The decode method in the OpenSSL::ASN1 module in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows attackers to cause a denial of service (interpreter crash) via a crafted string.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in install_location function of package.rb that can result in path traversal when writing to a symlinked basedir outside of the root. This vulnerability appears to have been fixed in 2.7.6.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop.. This vulnerability appears to have been fixed in 2.7.6.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Verification of Cryptographic Signature vulnerability in package.rb that can result in a mis-signed gem could be installed, as the tarball would contain multiple gem signatures.. This vulnerability appears to have been fixed in 2.7.6.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem could set an invalid homepage URL. This vulnerability appears to have been fixed in 2.7.6.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appear to be exploitable via the victim must browse to a malicious gem on a vulnerable gem server. This vulnerability appears to have been fixed in 2.7.6.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in gem installation that can result in the gem could write to arbitrary filesystem locations during installation. This attack appear to be exploitable via the victim must install a malicious gem. This vulnerability appears to have been fixed in 2.7.6.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки

Описание

The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.


Затронутые продукты
HPE Helion OpenStack 8:libruby2_1-2_1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-2.1.9-19.3.2
HPE Helion OpenStack 8:ruby2.1-stdlib-2.1.9-19.3.2
Image SLES12-SP4-Azure-BYOS:libruby2_1-2_1-2.1.9-19.3.2

Ссылки
Уязвимость SUSE-SU-2020:1570-1