Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2021:2230: Red Hat Security Advisory: rh-ruby26-ruby security, bug fix, and enhancement update

An update for rh-ruby26-ruby is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: rh-ruby26-ruby (2.6.7). (BZ#1701182) Security Fix(es):

  • rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881)
  • ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845)
  • ruby: Regular expression denial of service vulnerability of WEBrick’s Digest authentication (CVE-2019-16201)
  • ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255)
  • rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
  • ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933)
  • ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
  • ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
  • ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es):
  • rh-ruby26-ruby: Resolv::DNS: timeouts if multiple IPv6 name servers are given and address contains leading zero [rhscl-3] (BZ#1950331) Additional Changes: For detailed information on changes in this release, see the Red Hat Software Collections 3.7 Release Notes linked from the References section. Related CVEs:
  • CVE-2019-3881: rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code
  • CVE-2019-15845: ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch?
  • CVE-2019-16201: ruby: Regular expression denial of service vulnerability of WEBrick’s Digest authentication
  • CVE-2019-16254: ruby: HTTP response splitting in WEBrick
  • CVE-2019-16255: ruby: Code injection via command argument of Shell#test / Shell#[]
  • CVE-2020-10663: rubygem-json: Unsafe object creation vulnerability in JSON
  • CVE-2020-10933: ruby: BasicSocket#read_nonblock method leads to information disclosure
  • CVE-2020-25613: ruby: Potential HTTP request smuggling in WEBrick
  • CVE-2021-28965: ruby: XML round-trip vulnerability in REXML
Red Hat Security Data
#vulnerability#web#red_hat#dos#js

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update