ALT-BU-2018-3273-1
Branch c8 update bulletin.
Package firefox-esr updated to version 52.8.0-alt0.M80C.1 for branch c8 in task 206196.
Closed vulnerabilities
BDU:2018-01426
Уязвимость браузера Firefox ESR, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2019-03308
Уязвимость механизма обработки SVG-объектов браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03309
Уязвимость механизма обработки SVG-объектов браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03310
Уязвимость компонента PDF Viewer браузеров Firefox ESR и Firefox, позволяющая нарушителю повысить свои привилегии
BDU:2019-03311
Уязвимость компонента PDF Viewer браузеров Firefox ESR и Firefox, позволяющая нарушителю выполнить произвольный код
BDU:2019-03312
Уязвимость библиотеки Skia браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2019-03416
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-03510
Уязвимость компонента baseURI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю оказать влияние на целостность защищаемой информации
BDU:2021-04140
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти во время преобразования строки UTF-8 в Unicode, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-5150
Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388020%2C1433609%2C1409440%2C1448705%2C1451376%2C1452202%2C1444668%2C1393367%2C1411415%2C1426129
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1388020%2C1433609%2C1409440%2C1448705%2C1451376%2C1452202%2C1444668%2C1393367%2C1411415%2C1426129
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- USN-3688-1
- USN-3688-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5154
A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443092
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443092
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5155
A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1448774
- https://bugzilla.mozilla.org/show_bug.cgi?id=1448774
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5157
Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to intercept messages meant for the viewer. This could allow the site to retrieve PDF files restricted to viewing by an authenticated user on a third-party website. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449898
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449898
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- GLSA-201810-01
- GLSA-201810-01
- USN-3645-1
- USN-3645-1
- DSA-4199
- DSA-4199
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
Modified: 2024-11-21
CVE-2018-5158
The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452075
- https://bugzilla.mozilla.org/show_bug.cgi?id=1452075
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- GLSA-201810-01
- GLSA-201810-01
- USN-3645-1
- USN-3645-1
- DSA-4199
- DSA-4199
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
Modified: 2024-11-21
CVE-2018-5159
An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1441941
- https://bugzilla.mozilla.org/show_bug.cgi?id=1441941
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- 44759
- 44759
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5168
Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird < 52.8, Thunderbird ESR < 52.8, Firefox < 60, and Firefox ESR < 52.8.
- 104136
- 104136
- 1040896
- 1040896
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449548
- https://bugzilla.mozilla.org/show_bug.cgi?id=1449548
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3645-1
- USN-3645-1
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-11/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5178
A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
- 104138
- 104138
- 1040898
- 1040898
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
- https://bugzilla.mozilla.org/show_bug.cgi?id=1443891
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Modified: 2024-11-21
CVE-2018-5183
Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR < 52.8, Thunderbird < 52.8, and Firefox ESR < 52.8.
- 104138
- 104138
- 1040898
- 1040898
- RHSA-2018:1414
- RHSA-2018:1414
- RHSA-2018:1415
- RHSA-2018:1415
- RHSA-2018:1725
- RHSA-2018:1725
- RHSA-2018:1726
- RHSA-2018:1726
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454692
- https://bugzilla.mozilla.org/show_bug.cgi?id=1454692
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1376-1] firefox-esr security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- [debian-lts-announce] 20180525 [SECURITY] [DLA 1382-1] thunderbird security update
- GLSA-201810-01
- GLSA-201810-01
- GLSA-201811-13
- GLSA-201811-13
- USN-3660-1
- USN-3660-1
- DSA-4199
- DSA-4199
- DSA-4209
- DSA-4209
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-12/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
- https://www.mozilla.org/security/advisories/mfsa2018-13/
Closed vulnerabilities
BDU:2019-04036
Уязвимость методов Dir.open, Dir.new, Dir.entries и Dir.empty интерпретатора языка программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным или оказать воздействие на целостность защищаемой информации
BDU:2019-04156
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю внедрить произвольные HTTP-заголовки
BDU:2019-04470
Уязвимость метода Dir.mktmpdir библиотеки tmpdir интерпретатора языка программирования Ruby, позволяющая нарушителю записать произвольные файлы в файловую систему
BDU:2019-04471
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04472
Уязвимость метода String#unpack интерпретатора языка программирования Ruby, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-04473
Уязвимость методов UNIXServer.open и UNIXSocket.open интерпретатора языка программирования Ruby, позволяющая нарушителю обойти ограничения безопасности
Modified: 2024-11-21
CVE-2017-17742
Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103684
- 103684
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- USN-3685-1
- USN-3685-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
- https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-6914
Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103686
- 103686
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
- https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
Modified: 2024-11-21
CVE-2018-8777
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103683
- 103683
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- RHSA-2020:0542
- RHSA-2020:0542
- RHSA-2020:0591
- RHSA-2020:0591
- RHSA-2020:0663
- RHSA-2020:0663
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3685-1
- USN-3685-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
- https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-8778
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103693
- 103693
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
- https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-8779
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103767
- 103767
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-8780
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103739
- 103739
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- RHSA-2020:0542
- RHSA-2020:0542
- RHSA-2020:0591
- RHSA-2020:0591
- RHSA-2020:0663
- RHSA-2020:0663
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/