ALT-BU-2021-4291-1
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2020-00835
Уязвимость реализации метода интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольный код
BDU:2020-00863
Уязвимость метода File.fnmatch интерпретатора языка программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-00865
Уязвимость реализации класса WEBrick::HTTPAuth::DigestAuth библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00866
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю осуществить межсайтовые сценарные атаки
BDU:2020-04073
Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, связанная с некорректной нейтрализацией символов CR, LF, /r и /n перед внесением данных в HTTP-заголовки, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
BDU:2021-01472
Уязвимость библиотеки WEBrick языка программирования Ruby, связанная с некорректной проверкой значения заголовка, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2019-15845
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/449617
- https://hackerone.com/reports/449617
- [debian-lts-announce] 20191125 [SECURITY] [DLA 2007-1] ruby2.1 security update
- [debian-lts-announce] 20191125 [SECURITY] [DLA 2007-1] ruby2.1 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- USN-4201-1
- USN-4201-1
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
Modified: 2024-11-21
CVE-2019-16201
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/661722
- https://hackerone.com/reports/661722
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
Modified: 2024-11-21
CVE-2019-16254
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/331984
- https://hackerone.com/reports/331984
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- DSA-4586
- DSA-4586
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.ruby-lang.org/ja/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/
- https://www.ruby-lang.org/ja/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
Modified: 2024-11-21
CVE-2019-16255
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/327512
- https://hackerone.com/reports/327512
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.ruby-lang.org/ja/news/2019/10/01/code-injection-shell-test-cve-2019-16255/
- https://www.ruby-lang.org/ja/news/2019/10/01/code-injection-shell-test-cve-2019-16255/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
Modified: 2024-11-21
CVE-2020-25613
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
- https://github.com/ruby/webrick/commit/8946bb38b4d87549f0d99ed73c62c41933f97cc7
- https://github.com/ruby/webrick/commit/8946bb38b4d87549f0d99ed73c62c41933f97cc7
- https://hackerone.com/reports/965267
- https://hackerone.com/reports/965267
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- FEDORA-2020-02ca18c2a0
- FEDORA-2020-02ca18c2a0
- FEDORA-2020-fe2a7d7390
- FEDORA-2020-fe2a7d7390
- GLSA-202401-27
- GLSA-202401-27
- https://security.netapp.com/advisory/ntap-20210115-0008/
- https://security.netapp.com/advisory/ntap-20210115-0008/
- https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/
- https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/
Modified: 2024-11-21
CVE-2020-5247
In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
- https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v
- https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v
- [debian-lts-announce] 20220525 [SECURITY] [DLA 3023-1] puma security update
- [debian-lts-announce] 20220525 [SECURITY] [DLA 3023-1] puma security update
- FEDORA-2020-fd87f90634
- FEDORA-2020-fd87f90634
- FEDORA-2020-08092b4c97
- FEDORA-2020-08092b4c97
- FEDORA-2020-a3f26a9387
- FEDORA-2020-a3f26a9387
- https://owasp.org/www-community/attacks/HTTP_Response_Splitting
- https://owasp.org/www-community/attacks/HTTP_Response_Splitting
- https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254
- https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254
Closed bugs
Обновить
Closed vulnerabilities
BDU:2021-06303
Уязвимость функции virgl_cmd_get_capset_info() компонента contrib/vhost-user-gpu/virgl.c эмулятора аппаратного обеспечения QEMU, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-06305
Уязвимость компонентов contrib/vhost-user-gpu/vhost-user-gpu.c и contrib/vhost-user-gpu/virgl.c эмулятора аппаратного обеспечения QEMU, связанная с неправильным освобождением памяти перед удалением последний ссылки, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-06308
Уязвимость команды VIRTIO_GPU_CMD_GET_CAPSET эмулятора аппаратного обеспечения QEMU, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-3544
Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.
- [oss-security] 20210531 QEMU: security issues in vhost-user-gpu
- [oss-security] 20210531 QEMU: security issues in vhost-user-gpu
- https://bugzilla.redhat.com/show_bug.cgi?id=1958935
- https://bugzilla.redhat.com/show_bug.cgi?id=1958935
- GLSA-202208-27
- GLSA-202208-27
- https://security.netapp.com/advisory/ntap-20210720-0008/
- https://security.netapp.com/advisory/ntap-20210720-0008/
- DSA-4980
- DSA-4980
Modified: 2024-11-21
CVE-2021-3545
An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.
- [oss-security] 20210531 QEMU: security issues in vhost-user-gpu
- [oss-security] 20210531 QEMU: security issues in vhost-user-gpu
- https://bugzilla.redhat.com/show_bug.cgi?id=1958955
- https://bugzilla.redhat.com/show_bug.cgi?id=1958955
- GLSA-202208-27
- GLSA-202208-27
- https://security.netapp.com/advisory/ntap-20210720-0008/
- https://security.netapp.com/advisory/ntap-20210720-0008/
- DSA-4980
- DSA-4980
Modified: 2024-11-21
CVE-2021-3546
An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.
- [oss-security] 20210531 QEMU: security issues in vhost-user-gpu
- [oss-security] 20210531 QEMU: security issues in vhost-user-gpu
- https://bugzilla.redhat.com/show_bug.cgi?id=1958978
- https://bugzilla.redhat.com/show_bug.cgi?id=1958978
- GLSA-202208-27
- GLSA-202208-27
- https://security.netapp.com/advisory/ntap-20210720-0008/
- https://security.netapp.com/advisory/ntap-20210720-0008/
- DSA-4980
- DSA-4980