rh-ruby25-ruby-2.5.9-9.el7
エラータID: AXSA:2021-1762:01
Ruby is an extensible, interpreted, object-oriented, scripting language. It has
features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version:
rh-ruby25-ruby (2.5.9).
Security Fix(es):
* ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch?
(CVE-2019-15845)
* ruby: Regular expression denial of service vulnerability of WEBrick's Digest
authentication (CVE-2019-16201)
* ruby: Code injection via command argument of Shell#test / Shell#[]
(CVE-2019-16255)
* rubygem-json: Unsafe object creation vulnerability in JSON (CVE-2020-10663)
* ruby: BasicSocket#read_nonblock method leads to information disclosure
(CVE-2020-10933)
* ruby: Potential HTTP request smuggling in WEBrick (CVE-2020-25613)
* ruby: XML round-trip vulnerability in REXML (CVE-2021-28965)
* ruby: HTTP response splitting in WEBrick (CVE-2019-16254)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fix(es):
* rh-ruby25-ruby: Resolv::DNS: timeouts if multiple IPv6 name servers are
given and address contains leading zero [rhscl-3]
CVE-2019-15845
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path
checking within File.fnmatch functions.
CVE-2019-16201
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and
2.6.x through 2.6.4 has a regular expression Denial of Service cause by
looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth
to the Internet or a untrusted network.
CVE-2019-16254
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP
Response Splitting. If a program using WEBrick inserts untrusted input into the
response header, an attacker can exploit it to insert a newline character to
split a header, and inject malicious content to deceive clients. NOTE: this
issue exists because of an incomplete fix for CVE-2017-17742, which addressed
the CRLF vector, but did not address an isolated CR or an isolated LF.
CVE-2019-16255
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code
injection if the first argument (aka the "command" argument) to Shell#[] or
Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to
call an arbitrary Ruby method.
CVE-2020-10663
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5
through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation
Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor
garbage-collection behavior within Ruby. Specifically, use of JSON parsing
methods can lead to creation of a malicious object within the interpreter, with
adverse effects that are application-dependent.
CVE-2020-10933
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and
2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer,
exception: false), the method resizes the buffer to fit the requested size, but
no data is copied. Thus, the buffer string provides the previous value of the
heap. This may expose possibly sensitive data from the interpreter.
CVE-2020-25613
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x
through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked
the transfer-encoding header value rigorously. An attacker may potentially
exploit this issue to bypass a reverse proxy (which also has a poor header
check), which may lead to an HTTP Request Smuggling attack.
CVE-2021-28965
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x
before 3.0.1 does not properly address XML round-trip issues. An incorrect
document can be produced after parsing and serializing.
Update packages.
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
N/A
SRPMS
- rh-ruby25-ruby-2.5.9-9.el7.src.rpm
MD5: 5f8119849352929b059a0009c3147b44
SHA-256: eef4e6b018cc637b2bdf0a1a45e51067b9db422e1bb3a5904384a1a7dca950da
Size: 10.89 MB
Asianux Server 7 for x86_64
- rh-ruby25-ruby-2.5.9-9.el7.x86_64.rpm
MD5: 73aac8e7c9cf0d8de1f7b8cd852580db
SHA-256: 00a9f62c9a65cc11480f4f4caf3478840969ca872763bf87d3f96245ec7d763a
Size: 77.86 kB - rh-ruby25-ruby-devel-2.5.9-9.el7.x86_64.rpm
MD5: 7f2bb1cad46fe1238e56522ee40c5fa5
SHA-256: b437e9c54823f1a7c1391a7c1658464c5ddc0b71c4d87878a79a38ec4e039721
Size: 118.46 kB - rh-ruby25-ruby-doc-2.5.9-9.el7.noarch.rpm
MD5: 4b827014e5513f7f5fc387b551157531
SHA-256: 7aa6665bd412f0c67a9620c41ae597cfe73d936063af8219d4c7fd2b808e04b9
Size: 5.59 MB - rh-ruby25-rubygem-bigdecimal-1.3.4-9.el7.x86_64.rpm
MD5: 93411a44868a3462cfb21c3a51202d8d
SHA-256: da0f13c1a83203a64be9a6b524e450149e162621897365d021116834f496d113
Size: 88.62 kB - rh-ruby25-rubygem-did_you_mean-1.2.0-9.el7.noarch.rpm
MD5: 3cfb98690fa4d4dfd2cf4a7100d166ee
SHA-256: 3c3aa07fdc7adcd236e46007dddbdf643ac5f2c606756c933083eed4ec5a3cc5
Size: 74.68 kB - rh-ruby25-rubygem-io-console-0.4.6-9.el7.x86_64.rpm
MD5: 66acd61bcd964947437b3599c96768a4
SHA-256: c08c865948236c1f72aa31e202c56303f9946b9ece3a4a241ea3599d59b8bbe1
Size: 58.32 kB - rh-ruby25-rubygem-json-2.1.0-9.el7.x86_64.rpm
MD5: bb49facead22a3528b64336c7e1c42dd
SHA-256: f103776d319638feaebf4696b790fcb80cf23d6b82fa52c3ab3550aec02cb712
Size: 82.16 kB - rh-ruby25-rubygem-minitest-5.10.3-9.el7.noarch.rpm
MD5: bd90201e3e09e56f78a1b4641f4019bf
SHA-256: ebf446fd26871c8c6da8288e013674da2218a1a734c00867015e0002f2b07e3c
Size: 115.20 kB - rh-ruby25-rubygem-net-telnet-0.1.1-9.el7.noarch.rpm
MD5: 8ea1cb7df6bb28ab0bdbccac6183237a
SHA-256: c9db9c4e3b4f22d8670d269721cef3db06ce2355b8ee69b5c3d07a98fb2b225e
Size: 62.57 kB - rh-ruby25-rubygem-openssl-2.1.2-9.el7.x86_64.rpm
MD5: 73591f5efe0f3726c7ec3ffca05c8f7b
SHA-256: 974a124f5a98896d58bfc439821fcd68180b615964c874223415e0ee6e324602
Size: 178.59 kB - rh-ruby25-rubygem-power_assert-1.1.1-9.el7.noarch.rpm
MD5: 8043673219df994fc23a41442df14a04
SHA-256: 328db4b89e7ac8bead8e890416fbfe63c8d34fe3231d8080c0684425f2a13e5a
Size: 61.77 kB - rh-ruby25-rubygem-psych-3.0.2-9.el7.x86_64.rpm
MD5: 4623fe4ff1f18371518845aa0d882abc
SHA-256: ea35b0183ed6b796f667381610f35db17acc0d330c8c05e9c8ea256b1b49eaf8
Size: 86.95 kB - rh-ruby25-rubygem-rake-12.3.3-9.el7.noarch.rpm
MD5: 2e48e1780a66fe14e14e9426bdf54eb8
SHA-256: 4af2ed2e6f17109b616aabc168ca1567fba6cef92b23f16c9383b9fca1b9b40b
Size: 134.30 kB - rh-ruby25-rubygem-rdoc-6.0.1.1-9.el7.noarch.rpm
MD5: 4eec6eb9afd945de74951a8f03faa0cc
SHA-256: fcbc5d2a879eadb1e6e49fb9778115f45717e3c821bd16c267c5785f6599e3da
Size: 449.79 kB - rh-ruby25-rubygems-2.7.6.3-9.el7.noarch.rpm
MD5: fa1b7003e95f7648547603ccea6647d5
SHA-256: 56d1cf859facb03e1c234ee200323aadb0b99b58468cbe3e60e874e46bdd5b5c
Size: 303.03 kB - rh-ruby25-rubygems-devel-2.7.6.3-9.el7.noarch.rpm
MD5: f5d65a243527a68ea9a8e58a52bd5d83
SHA-256: 77ffcb2129a77d2189dcee61f7ca0faee0d0fc7790cd2aa0a6d148621ffd97e1
Size: 49.74 kB - rh-ruby25-rubygem-test-unit-3.2.7-9.el7.noarch.rpm
MD5: de7541846186b57c79273b4a8ae07234
SHA-256: daab17aa85f2842927a32acafd3dc1e8a5e8d0be368269329db5780947cebf77
Size: 176.50 kB - rh-ruby25-rubygem-xmlrpc-0.3.0-9.el7.noarch.rpm
MD5: a593a8a60b18fbddcbadc487838351d8
SHA-256: 3f479132fca85d6906eefc18e180cc4b2034316c39d1cd82559dba1f2ec84dca
Size: 74.22 kB - rh-ruby25-ruby-irb-2.5.9-9.el7.noarch.rpm
MD5: fe5f3976ccace6e28e7e661df3f316ff
SHA-256: 199479b79bfc9d2ff8e78838067e7c89e6468251f092b0f39b10525d2ac12355
Size: 94.62 kB - rh-ruby25-ruby-libs-2.5.9-9.el7.x86_64.rpm
MD5: 1d1b95e0def47bba6fe752ef4fd92137
SHA-256: 76b172ecb6c548443fd0ceb604e563d07c13a5234a62a9293d54294a00ce908e
Size: 2.85 MB