(RHSA-2020:0663) Moderate: ruby security update

2020-03-03T18:41:04
ID RHSA-2020:0663
Type redhat
Reporter RedHat
Modified 2020-03-03T19:36:16

Description

Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.

Security Fix(es):

  • ruby: DoS by large request in WEBrick (CVE-2018-8777)

  • ruby: Unintentional directory traversal by poisoned NULL byte in Dir (CVE-2018-8780)

  • rubygems: Path traversal when writing to a symlinked basedir outside of the root (CVE-2018-1000073)

  • rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (CVE-2018-1000074)

  • rubygems: Improper verification of signatures in tarball allows to install mis-signed gem (CVE-2018-1000076)

  • rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (CVE-2018-1000077)

  • rubygems: XSS vulnerability in homepage attribute when displayed via gem server (CVE-2018-1000078)

  • rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations (CVE-2018-1000079)

  • rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service (CVE-2018-1000075)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.