[SUSE-SU-2019:1804-1] Security update for ruby-bundled-gems-rpmhelper, ruby2.5
Security update for ruby-bundled-gems-rpmhelper, ruby2.5
This update for ruby2.5 and ruby-bundled-gems-rpmhelper fixes the following issues:
Changes in ruby2.5:
Update to 2.5.5 and 2.5.4:
https://www.ruby-lang.org/en/news/2019/03/15/ruby-2-5-5-released/
https://www.ruby-lang.org/en/news/2019/03/13/ruby-2-5-4-released/
Security issues fixed:
- CVE-2019-8320: Delete directory using symlink when decompressing tar (bsc#1130627)
- CVE-2019-8321: Escape sequence injection vulnerability in verbose (bsc#1130623)
- CVE-2019-8322: Escape sequence injection vulnerability in gem owner (bsc#1130622)
- CVE-2019-8323: Escape sequence injection vulnerability in API response handling (bsc#1130620)
- CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution (bsc#1130617)
- CVE-2019-8325: Escape sequence injection vulnerability in errors (bsc#1130611)
Ruby 2.5 was updated to 2.5.3:
This release includes some bug fixes and some security fixes.
Security issues fixed:
- CVE-2018-16396: Tainted flags are not propagated in Array#pack and String#unpack with some directives (bsc#1112532)
- CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly (bsc#1112530)
Ruby 2.5 was updated to 2.5.1:
This release includes some bug fixes and some security fixes.
Security issues fixed:
- CVE-2017-17742: HTTP response splitting in WEBrick (bsc#1087434)
- CVE-2018-6914: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441)
- CVE-2018-8777: DoS by large request in WEBrick (bsc#1087436)
- CVE-2018-8778: Buffer under-read in String#unpack (bsc#1087433)
- CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440)
CVE-2018-8780: Unintentional directory traversal by poisoned
NUL byte in Dir (bsc#1087437)Multiple vulnerabilities in RubyGems were fixed:
- CVE-2018-1000079: Fixed path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058)
- CVE-2018-1000075: Fixed infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014)
- CVE-2018-1000078: Fixed XSS vulnerability in homepage attribute when displayed via gem server (bsc#1082011)
- CVE-2018-1000077: Fixed that missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (bsc#1082010)
- CVE-2018-1000076: Fixed improper verification of signatures in tarball allows to install mis-signed gem (bsc#1082009)
- CVE-2018-1000074: Fixed unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (bsc#1082008)
- CVE-2018-1000073: Fixed path traversal when writing to a symlinked basedir outside of the root (bsc#1082007)
Other changes:
- Fixed Net::POPMail methods modify frozen literal when using default arg
- ruby: change over of the Japanese Era to the new emperor May 1st 2019 (bsc#1133790)
- build with PIE support (bsc#1130028)
Changes in ruby-bundled-gems-rpmhelper:
- Add a new helper for bundled ruby gems.
- ID
- SUSE-SU-2019:1804-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2019/suse-su-20191804-1/
- Published
-
2019-07-10T08:40:49
(5 years ago) - Modified
-
2019-07-10T08:40:49
(5 years ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2018-1113
- ALAS-2018-983
- ALAS-2019-1255
- ALAS-2020-1416
- ALAS2-2018-983
- ALAS2-2019-1143
- ALAS2-2019-1249
- ALAS2-2019-1276
- ALBA-2019:3384
- ALPINE:CVE-2017-17742
- ALPINE:CVE-2018-16395
- ALPINE:CVE-2018-16396
- ALPINE:CVE-2018-6914
- ALPINE:CVE-2018-8777
- ALPINE:CVE-2018-8778
- ALPINE:CVE-2018-8779
- ALPINE:CVE-2018-8780
- ALPINE:CVE-2019-8320
- ALPINE:CVE-2019-8321
- ALPINE:CVE-2019-8322
- ALPINE:CVE-2019-8323
- ALPINE:CVE-2019-8324
- ALPINE:CVE-2019-8325
- ALSA-2019:1972
- DSA-4219-1
- DSA-4259-1
- DSA-4332-1
- DSA-4433-1
- ELSA-2018-3738
- ELSA-2019-1235
- ELSA-2019-1972
- ELSA-2019-2028
- FEDORA-2018-190ecd2ef8
- FEDORA-2018-1fffa787e7
- FEDORA-2018-319b9d0f68
- FEDORA-2018-40ed78700c
- FEDORA-2018-6070bcf454
- FEDORA-2018-7be77249d4
- FEDORA-2018-a459acd54b
- FEDORA-2018-dd8162c004
- FEDORA-2019-a155364f3c
- FEDORA-2019-feac6674b7
- FREEBSD:27B12D04-4722-11E9-8B7C-B5E01141761F
- FREEBSD:AFC60484-0652-440E-B01A-5EF814747F06
- FREEBSD:EB69BCF2-18EF-4AA2-BB0C-83B263364089
- MAVEN:GHSA-74PV-V9GH-H25P
- MAVEN:GHSA-87QX-G5WG-MWMJ
- MAVEN:GHSA-8QXG-MFF5-J3WC
- MAVEN:GHSA-GV86-43RV-79M2
- MAVEN:GHSA-GX69-6CP4-HXRJ
- MAVEN:GHSA-MC6J-H948-V2P6
- MAVEN:GHSA-QJ2W-MW2R-PV39
- MS:CVE-2018-16395
- openSUSE-SU-2019:1771-1
- RHBA-2019:3384
- RHSA-2018:3738
- RHSA-2019:1235
- RHSA-2019:1972
- RHSA-2019:2028
- RLBA-2019:3384
- RLSA-2019:1972
- RUBYSEC:OPENSSL-2018-16395
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000073
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000074
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000075
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000076
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000077
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000078
- RUBYSEC:RUBYGEMS-UPDATE-2018-1000079
- RUBYSEC:RUBYGEMS-UPDATE-2019-8320
- RUBYSEC:RUBYGEMS-UPDATE-2019-8321
- RUBYSEC:RUBYGEMS-UPDATE-2019-8322
- RUBYSEC:RUBYGEMS-UPDATE-2019-8323
- RUBYSEC:RUBYGEMS-UPDATE-2019-8324
- RUBYSEC:RUBYGEMS-UPDATE-2019-8325
- RUBYSEC:TMPDIR-2021-28966
- SSA:2018-088-01
- SUSE-SU-2020:1570-1
- USN-3621-1
- USN-3621-2
- USN-3626-1
- USN-3685-1
- USN-3808-1
- USN-3945-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |