Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2021:1535-1

Опубликовано: 06 дек. 2021
Источник: suse-cvrf

Описание

Security update for ruby2.5

This update for ruby2.5 fixes the following issues:

  • CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375).
  • CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161).
  • CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.2
libruby2_5-2_5-2.5.9-lp152.2.9.1
ruby2.5-2.5.9-lp152.2.9.1
ruby2.5-devel-2.5.9-lp152.2.9.1
ruby2.5-devel-extra-2.5.9-lp152.2.9.1
ruby2.5-doc-2.5.9-lp152.2.9.1
ruby2.5-doc-ri-2.5.9-lp152.2.9.1
ruby2.5-stdlib-2.5.9-lp152.2.9.1

Описание

In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.


Затронутые продукты
openSUSE Leap 15.2:libruby2_5-2_5-2.5.9-lp152.2.9.1
openSUSE Leap 15.2:ruby2.5-2.5.9-lp152.2.9.1
openSUSE Leap 15.2:ruby2.5-devel-2.5.9-lp152.2.9.1
openSUSE Leap 15.2:ruby2.5-devel-extra-2.5.9-lp152.2.9.1

Ссылки

Описание

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).


Затронутые продукты
openSUSE Leap 15.2:libruby2_5-2_5-2.5.9-lp152.2.9.1
openSUSE Leap 15.2:ruby2.5-2.5.9-lp152.2.9.1
openSUSE Leap 15.2:ruby2.5-devel-2.5.9-lp152.2.9.1
openSUSE Leap 15.2:ruby2.5-devel-extra-2.5.9-lp152.2.9.1

Ссылки

Описание

An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."


Затронутые продукты
openSUSE Leap 15.2:libruby2_5-2_5-2.5.9-lp152.2.9.1
openSUSE Leap 15.2:ruby2.5-2.5.9-lp152.2.9.1
openSUSE Leap 15.2:ruby2.5-devel-2.5.9-lp152.2.9.1
openSUSE Leap 15.2:ruby2.5-devel-extra-2.5.9-lp152.2.9.1

Ссылки