rh-ruby25-ruby-2.5.3-6.el7

エラータID: AXSA:2019-3613:01

Release date: 
Friday, February 15, 2019 - 14:27
Subject: 
rh-ruby25-ruby-2.5.3-6.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.

The following packages have been upgraded to a later upstream version: rh-ruby25-ruby (2.5.3), rh-ruby25-rubygems (2.7.6), rh-ruby25-rubygem-openssl (2.1.2). (BZ#1650588)

Security Fix(es):

* ruby: OpenSSL::X509::Name equality check does not work correctly (CVE-2018-16395)

* ruby: HTTP response splitting in WEBrick (CVE-2017-17742)

* ruby: DoS by large request in WEBrick (CVE-2018-8777)

* ruby: Buffer under-read in String#unpack (CVE-2018-8778)

* ruby: Unintentional directory traversal by poisoned NULL byte in Dir (CVE-2018-8780)

* ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives (CVE-2018-16396)

* rubygems: Path traversal when writing to a symlinked basedir outside of the root (CVE-2018-1000073)

* rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (CVE-2018-1000074)

* rubygems: Improper verification of signatures in tarball allows to install mis-signed gem (CVE-2018-1000076)

* rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (CVE-2018-1000077)

* rubygems: XSS vulnerability in homepage attribute when displayed via gem server (CVE-2018-1000078)

* rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations (CVE-2018-1000079)

* ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (CVE-2018-6914)

* ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket (CVE-2018-8779)

* rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service (CVE-2018-1000075)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2017-17742
Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.
CVE-2018-6914
Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
CVE-2018-8777
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
CVE-2018-8778
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
CVE-2018-8779
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
CVE-2018-8780
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
CVE-2018-16395
An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.
CVE-2018-16396
An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.
CVE-2018-1000073
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in install_location function of package.rb that can result in path traversal when writing to a symlinked basedir outside of the root. This vulnerability appears to have been fixed in 2.7.6.
CVE-2018-1000074
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.
CVE-2018-1000075
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop.. This vulnerability appears to have been fixed in 2.7.6.
CVE-2018-1000076
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Verification of Cryptographic Signature vulnerability in package.rb that can result in a mis-signed gem could be installed, as the tarball would contain multiple gem signatures.. This vulnerability appears to have been fixed in 2.7.6.
CVE-2018-1000077
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem could set an invalid homepage URL. This vulnerability appears to have been fixed in 2.7.6.
CVE-2018-1000078
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appear to be exploitable via the victim must browse to a malicious gem on a vulnerable gem server. This vulnerability appears to have been fixed in 2.7.6.
CVE-2018-1000079
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in gem installation that can result in the gem could write to arbitrary filesystem locations during installation. This attack appear to be exploitable via the victim must install a malicious gem. This vulnerability appears to have been fixed in 2.7.6.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. rh-ruby25-ruby-2.5.3-6.el7.src.rpm
    MD5: d598a3570bcc5fac0e32863474c75047
    SHA-256: 8a9b2bd561ecf42fe995e2be4cf6f426a8dcd4a74ef4ee7986ef74f2f5a983b1
    Size: 11.02 MB

Asianux Server 7 for x86_64
  1. rh-ruby25-ruby-2.5.3-6.el7.x86_64.rpm
    MD5: 9d6bc5c67a829c250506fe86f06e82de
    SHA-256: c7a966c6f0218818fd29e9858e178fb72d9d8c8a2a8b24a7aa7000175b51ec5d
    Size: 76.93 kB
  2. rh-ruby25-ruby-devel-2.5.3-6.el7.x86_64.rpm
    MD5: 37258b561fc179cf9c5338c22fb43a54
    SHA-256: 59d263df295e4f78d2b8085821cc2a52f3a4517bd671e312fe2a611cbd1a4923
    Size: 117.63 kB
  3. rh-ruby25-ruby-doc-2.5.3-6.el7.noarch.rpm
    MD5: 1bde5e23f94256066fd9a7cf4ec7d7d5
    SHA-256: 0a2652eb9f2f378b9de35367d142f0eb343c6302e9409890c2a4323726988887
    Size: 5.60 MB
  4. rh-ruby25-rubygem-bigdecimal-1.3.4-6.el7.x86_64.rpm
    MD5: b55ddafbd602ecc6386f416ada138594
    SHA-256: acc5f134b02ec3871a5341047e96e320e0b4c9758f7671ffb5f62333ff4460cf
    Size: 87.66 kB
  5. rh-ruby25-rubygem-did_you_mean-1.2.0-6.el7.noarch.rpm
    MD5: 5f98f6f2b5e1d217e44db6397f097b4d
    SHA-256: cd89668d6d3c436372089b6d24f5b55e6cd83b1a2e365c73cca7df4a8e0dfc77
    Size: 82.67 kB
  6. rh-ruby25-rubygem-io-console-0.4.6-6.el7.x86_64.rpm
    MD5: 8eea2fd09cc39e16b98b3887c6db49b0
    SHA-256: 66c30b498b20792c9948c7087a663131b9b9be9ef1b7b82ff59bd4c4179cf3de
    Size: 57.34 kB
  7. rh-ruby25-rubygem-json-2.1.0-6.el7.x86_64.rpm
    MD5: 2b9887a1d76ad480a7410dfe32a16a2c
    SHA-256: f7704793854d1124ee0b848cd1e47060aa2fbe18997f0d76cd24924f118ffc91
    Size: 81.64 kB
  8. rh-ruby25-rubygem-minitest-5.10.3-6.el7.noarch.rpm
    MD5: 9b00f9e8407ae838982cb9f4005d89f2
    SHA-256: e0b3225bf08fe0fc234dd904b6d67842526d7151144e634bf46ac06ed147cc8f
    Size: 114.18 kB
  9. rh-ruby25-rubygem-net-telnet-0.1.1-6.el7.noarch.rpm
    MD5: 3fdb855f48f1b1d2d6a50071c1eb7c85
    SHA-256: fe32f34c89c2a3426d9f533ba230a4f9acd8f19b22b9f282c271dfab375a4755
    Size: 61.59 kB
  10. rh-ruby25-rubygem-openssl-2.1.2-6.el7.x86_64.rpm
    MD5: 33da178adfc89ac752d01fb1f71057e7
    SHA-256: d125b5f16b86fae0734e9ed67064fc8809d596448a89f3c44f4dc2939b708a46
    Size: 177.64 kB
  11. rh-ruby25-rubygem-power_assert-1.1.1-6.el7.noarch.rpm
    MD5: e1cfa22a7a7b4dc812928a88c1f2a07f
    SHA-256: a73932b90e5e9df37ba4cef4437d1dea46f676809d50d85c04f5740f3c5d6407
    Size: 60.80 kB
  12. rh-ruby25-rubygem-psych-3.0.2-6.el7.x86_64.rpm
    MD5: a154324720560b4004a32e7fefe83f05
    SHA-256: 5e90e72d6ddd9c75c6aace17588d11ddf087edc29419dd0c5b64dba4282c471d
    Size: 86.14 kB
  13. rh-ruby25-rubygem-rake-12.3.0-6.el7.noarch.rpm
    MD5: c547881c451a7a238658f73297569a49
    SHA-256: ba616f2ce4d96eca01621c376e6ddd3df0e93d88a986dba4bc1d0a333bc413ee
    Size: 131.21 kB
  14. rh-ruby25-rubygem-rdoc-6.0.1-6.el7.noarch.rpm
    MD5: b6d8b9f12d43fb38faa0798a5c71e654
    SHA-256: 019a631ff33c768ee6607d43fdedd71c5f1f3438a7c931d2b129725fef52c027
    Size: 480.07 kB
  15. rh-ruby25-rubygems-2.7.6-6.el7.noarch.rpm
    MD5: 43a367aa9b8b2ddb09ff241e40434bf9
    SHA-256: 165c62ebcb8f29ffd7cec74d5d9d066212292a26892e096ba9c5c8572d82b08a
    Size: 302.45 kB
  16. rh-ruby25-rubygems-devel-2.7.6-6.el7.noarch.rpm
    MD5: a5ddd18c194ed44d303130940ce15d12
    SHA-256: 045ff17ccf75c70d349b2c13f3553115cb52ea68679ef2e14ed77776eabf2f7f
    Size: 48.71 kB
  17. rh-ruby25-rubygem-test-unit-3.2.7-6.el7.noarch.rpm
    MD5: 26892353bdb888d5cbd85291694e6b30
    SHA-256: d6c09da9c5e86cc7182d01633084e23e05aa4e3193702983496e6ffbe8c644cb
    Size: 175.48 kB
  18. rh-ruby25-rubygem-xmlrpc-0.3.0-6.el7.noarch.rpm
    MD5: 1f1558df5c3e44cffbb456ccd2d524a5
    SHA-256: 54dbc711fb2b3733e4ba8d983cd7cd30bcf21298d56432492087f280b97c2e9f
    Size: 73.23 kB
  19. rh-ruby25-ruby-irb-2.5.3-6.el7.noarch.rpm
    MD5: 2e1328aa6aaa121bfcb2e10ad875840d
    SHA-256: 4521a758d830a18368fb7c1a7d6453ef5d2d4f4fb5f29023af2771a793508cc8
    Size: 93.72 kB
  20. rh-ruby25-ruby-libs-2.5.3-6.el7.x86_64.rpm
    MD5: 634c5b1f4631304716115f3749c15efa
    SHA-256: c68b27ce0dadd8cf765637fa671d06016e5795ca9ec1785b21a9ad57d5453943
    Size: 2.85 MB