Headline
RHSA-2021:2230: Red Hat Security Advisory: rh-ruby26-ruby security, bug fix, and enhancement update
An update for rh-ruby26-ruby is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. The following packages have been upgraded to a later upstream version: rh-ruby26-ruby (2.6.7). (BZ#1701182) Security Fix(es):
- rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code (CVE-2019-3881)
- ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (CVE-2019-15845)
- ruby: Regular expression denial of service vulnerability of WEBrick’s Digest authentication (CVE-2019-16201)
- ruby: Code injection via command argument of Shell#test / Shell#[] (CVE-2019-16255)
- rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
- ruby: BasicSocket#read_nonblock method leads to information disclosure (CVE-2020-10933)
- ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
- ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
- ruby: HTTP response splitting in WEBrick (CVE-2019-16254) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es):
- rh-ruby26-ruby: Resolv::DNS: timeouts if multiple IPv6 name servers are given and address contains leading zero [rhscl-3] (BZ#1950331) Additional Changes: For detailed information on changes in this release, see the Red Hat Software Collections 3.7 Release Notes linked from the References section. Related CVEs:
- CVE-2019-3881: rubygem-bundler: Insecure permissions on directory in /tmp/ allows for execution of malicious code
- CVE-2019-15845: ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch?
- CVE-2019-16201: ruby: Regular expression denial of service vulnerability of WEBrick’s Digest authentication
- CVE-2019-16254: ruby: HTTP response splitting in WEBrick
- CVE-2019-16255: ruby: Code injection via command argument of Shell#test / Shell#[]
- CVE-2020-10663: rubygem-json: Unsafe object creation vulnerability in JSON
- CVE-2020-10933: ruby: BasicSocket#read_nonblock method leads to information disclosure
- CVE-2020-25613: ruby: Potential HTTP request smuggling in WEBrick
- CVE-2021-28965: ruby: XML round-trip vulnerability in REXML