ALT-PU-2017-2097-1
Closed vulnerabilities
BDU:2015-09978
Уязвимость интерпретатора Ruby, позволяющая нарушителю подменить SSL-сервер
BDU:2016-00903
Уязвимость интерпретатора Ruby, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2020-00866
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю осуществить межсайтовые сценарные атаки
BDU:2020-04073
Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, связанная с некорректной нейтрализацией символов CR, LF, /r и /n перед внесением данных в HTTP-заголовки, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
Modified: 2024-11-21
CVE-2009-5147
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
- [oss-security] 20150728 Re: CVE request: Two ruby 'dl' vulnerabilities fixed in ruby-1.9.1-p129
- [oss-security] 20150728 Re: CVE request: Two ruby 'dl' vulnerabilities fixed in ruby-1.9.1-p129
- 76060
- 76060
- RHSA-2018:0583
- RHSA-2018:0583
- https://bugzilla.redhat.com/show_bug.cgi?id=1248935
- https://bugzilla.redhat.com/show_bug.cgi?id=1248935
- https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b
- https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b
- https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
- https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
Modified: 2024-11-21
CVE-2012-4464
Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.
- FEDORA-2012-15376
- FEDORA-2012-15376
- FEDORA-2012-15395
- FEDORA-2012-15395
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068
- [oss-security] 20121002 CVE Request: Ruby safe level bypasses
- [oss-security] 20121002 CVE Request: Ruby safe level bypasses
- [oss-security] 20121003 Re: CVE Request: Ruby safe level bypasses
- [oss-security] 20121003 Re: CVE Request: Ruby safe level bypasses
- http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
- http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
- https://bugzilla.redhat.com/show_bug.cgi?id=862598
- https://bugzilla.redhat.com/show_bug.cgi?id=862598
Modified: 2024-11-21
CVE-2012-4466
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.
- FEDORA-2012-15376
- FEDORA-2012-15376
- FEDORA-2012-15395
- FEDORA-2012-15395
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068
- MDVSA-2013:124
- MDVSA-2013:124
- [oss-security] 20121002 CVE Request: Ruby safe level bypasses
- [oss-security] 20121002 CVE Request: Ruby safe level bypasses
- [oss-security] 20121003 Re: CVE Request: Ruby safe level bypasses
- [oss-security] 20121003 Re: CVE Request: Ruby safe level bypasses
- http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
- http://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
- https://bugzilla.redhat.com/show_bug.cgi?id=862614
- https://bugzilla.redhat.com/show_bug.cgi?id=862614
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0294
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0294
Modified: 2024-11-21
CVE-2012-4522
The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.
- FEDORA-2012-16071
- FEDORA-2012-16071
- FEDORA-2012-16086
- FEDORA-2012-16086
- RHSA-2013:0129
- RHSA-2013:0129
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37163
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37163
- [oss-security] 20121012 CVE request: ruby file creation due in insertion of illegal NUL character
- [oss-security] 20121012 CVE request: ruby file creation due in insertion of illegal NUL character
- [oss-security] 20121013 Re: CVE request: ruby file creation due in insertion of illegal NUL character
- [oss-security] 20121013 Re: CVE request: ruby file creation due in insertion of illegal NUL character
- [oss-security] 20121016 Re: CVE request: ruby file creation due in insertion of illegal NUL character
- [oss-security] 20121016 Re: CVE request: ruby file creation due in insertion of illegal NUL character
- http://www.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability/
- http://www.ruby-lang.org/en/news/2012/10/12/poisoned-NUL-byte-vulnerability/
Modified: 2024-11-21
CVE-2013-0256
darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
- http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
- http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2
- SUSE-SU-2013:0647
- SUSE-SU-2013:0647
- openSUSE-SU-2013:0303
- openSUSE-SU-2013:0303
- RHSA-2013:0548
- RHSA-2013:0548
- RHSA-2013:0686
- RHSA-2013:0686
- RHSA-2013:0701
- RHSA-2013:0701
- RHSA-2013:0728
- RHSA-2013:0728
- 52774
- 52774
- http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/
- http://www.ruby-lang.org/en/news/2013/02/06/rdoc-xss-cve-2013-0256/
- USN-1733-1
- USN-1733-1
- https://bugzilla.redhat.com/show_bug.cgi?id=907820
- https://bugzilla.redhat.com/show_bug.cgi?id=907820
- https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60
- https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60
Modified: 2024-11-21
CVE-2013-1821
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525
- SUSE-SU-2013:0609
- SUSE-SU-2013:0609
- SUSE-SU-2013:0647
- SUSE-SU-2013:0647
- openSUSE-SU-2013:0603
- openSUSE-SU-2013:0603
- openSUSE-SU-2013:0614
- openSUSE-SU-2013:0614
- RHSA-2013:0611
- RHSA-2013:0611
- RHSA-2013:0612
- RHSA-2013:0612
- RHSA-2013:1028
- RHSA-2013:1028
- RHSA-2013:1147
- RHSA-2013:1147
- 52783
- 52783
- 52902
- 52902
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384
- DSA-2738
- DSA-2738
- DSA-2809
- DSA-2809
- MDVSA-2013:124
- MDVSA-2013:124
- [oss-security] 20130306 CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)
- [oss-security] 20130306 CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/
- http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/
- 58141
- 58141
- SSA:2013-075-01
- SSA:2013-075-01
- USN-1780-1
- USN-1780-1
- https://bugzilla.redhat.com/show_bug.cgi?id=914716
- https://bugzilla.redhat.com/show_bug.cgi?id=914716
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092
Modified: 2024-11-21
CVE-2013-2065
(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
- FEDORA-2013-8411
- FEDORA-2013-8411
- FEDORA-2013-8375
- FEDORA-2013-8375
- FEDORA-2013-8738
- FEDORA-2013-8738
- openSUSE-SU-2013:1611
- openSUSE-SU-2013:1611
- USN-2035-1
- USN-2035-1
- https://puppet.com/security/cve/cve-2013-2065
- https://puppet.com/security/cve/cve-2013-2065
- https://www.ruby-lang.org/en/news/2013/05/14/taint-bypass-dl-fiddle-cve-2013-2065/
- https://www.ruby-lang.org/en/news/2013/05/14/taint-bypass-dl-fiddle-cve-2013-2065/
Modified: 2024-11-21
CVE-2013-4164
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
- APPLE-SA-2014-04-22-1
- APPLE-SA-2014-04-22-1
- APPLE-SA-2014-10-16-3
- APPLE-SA-2014-10-16-3
- SUSE-SU-2013:1897
- SUSE-SU-2013:1897
- openSUSE-SU-2013:1834
- openSUSE-SU-2013:1834
- openSUSE-SU-2013:1835
- openSUSE-SU-2013:1835
- 100113
- 100113
- RHSA-2013:1763
- RHSA-2013:1763
- RHSA-2013:1764
- RHSA-2013:1764
- RHSA-2013:1767
- RHSA-2013:1767
- RHSA-2014:0011
- RHSA-2014:0011
- RHSA-2014:0215
- RHSA-2014:0215
- 55787
- 55787
- 57376
- 57376
- DSA-2809
- DSA-2809
- DSA-2810
- DSA-2810
- 63873
- 63873
- USN-2035-1
- USN-2035-1
- https://puppet.com/security/cve/cve-2013-4164
- https://puppet.com/security/cve/cve-2013-4164
- https://support.apple.com/kb/HT6536
- https://support.apple.com/kb/HT6536
- https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164
- https://www.ruby-lang.org/en/news/2013/11/22/heap-overflow-in-floating-point-parsing-cve-2013-4164
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-1-9-3-p484-is-released
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-1-9-3-p484-is-released
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-2-0-0-p353-is-released
- https://www.ruby-lang.org/en/news/2013/11/22/ruby-2-0-0-p353-is-released
Modified: 2024-11-21
CVE-2013-4287
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.
- http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html
- http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html
- RHSA-2013:1427
- RHSA-2013:1427
- RHSA-2013:1441
- RHSA-2013:1441
- RHSA-2013:1523
- RHSA-2013:1523
- RHSA-2013:1852
- RHSA-2013:1852
- RHSA-2014:0207
- RHSA-2014:0207
- 55381
- 55381
- [oss-security] 20130909 CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130909 CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- https://puppet.com/security/cve/cve-2013-4287
- https://puppet.com/security/cve/cve-2013-4287
Modified: 2024-11-21
CVE-2013-4363
Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.
- http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html
- http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html
- [oss-security] 20130915 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130915 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130918 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130918 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130920 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- [oss-security] 20130920 Re: CVE-2013-4287 Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
- https://puppet.com/security/cve/cve-2013-4363
- https://puppet.com/security/cve/cve-2013-4363
Modified: 2024-11-21
CVE-2014-2734
The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher
- http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html
- http://packetstormsecurity.com/files/126218/Ruby-OpenSSL-Private-Key-Spoofing.html
- 20140416 Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC
- 20140416 Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC
- 20140502 Re: Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC
- 20140502 Re: Ruby OpenSSL private key spoofing ~ CVE-2014-2734 with PoC
- 106006
- 106006
- 66956
- 66956
- https://gist.github.com/10446549
- https://gist.github.com/10446549
- https://gist.github.com/emboss/91696b56cd227c8a0c13
- https://gist.github.com/emboss/91696b56cd227c8a0c13
- https://github.com/adrienthebo/cve-2014-2734/
- https://github.com/adrienthebo/cve-2014-2734/
- https://news.ycombinator.com/item?id=7601973
- https://news.ycombinator.com/item?id=7601973
- https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/
- https://www.ruby-lang.org/en/news/2014/05/09/dispute-of-vulnerability-cve-2014-2734/
Modified: 2024-11-21
CVE-2014-4975
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
- http://advisories.mageia.org/MGASA-2014-0472.html
- http://advisories.mageia.org/MGASA-2014-0472.html
- RHSA-2014:1912
- RHSA-2014:1912
- RHSA-2014:1913
- RHSA-2014:1913
- RHSA-2014:1914
- RHSA-2014:1914
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778
- http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778
- DSA-3157
- DSA-3157
- MDVSA-2015:129
- MDVSA-2015:129
- [oss-security] 20140709 Fwd: [ruby-core:63604] [ruby-trunk - Bug #10019] [Open] segmentation fault/buffer overrun in pack.c (encodes)
- [oss-security] 20140709 Fwd: [ruby-core:63604] [ruby-trunk - Bug #10019] [Open] segmentation fault/buffer overrun in pack.c (encodes)
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 68474
- 68474
- USN-2397-1
- USN-2397-1
- https://bugs.ruby-lang.org/issues/10019
- https://bugs.ruby-lang.org/issues/10019
- https://bugzilla.redhat.com/show_bug.cgi?id=1118158
- https://bugzilla.redhat.com/show_bug.cgi?id=1118158
- ruby-cve20144975-bo(94706)
- ruby-cve20144975-bo(94706)
Modified: 2024-11-21
CVE-2014-8080
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
- http://advisories.mageia.org/MGASA-2014-0443.html
- http://advisories.mageia.org/MGASA-2014-0443.html
- APPLE-SA-2015-09-30-3
- APPLE-SA-2015-09-30-3
- openSUSE-SU-2014:1589
- openSUSE-SU-2014:1589
- openSUSE-SU-2015:0002
- openSUSE-SU-2015:0002
- openSUSE-SU-2015:0007
- openSUSE-SU-2015:0007
- RHSA-2014:1911
- RHSA-2014:1911
- RHSA-2014:1912
- RHSA-2014:1912
- RHSA-2014:1913
- RHSA-2014:1913
- RHSA-2014:1914
- RHSA-2014:1914
- 61607
- 61607
- 62050
- 62050
- 62748
- 62748
- DSA-3157
- DSA-3157
- DSA-3159
- DSA-3159
- MDVSA-2015:129
- MDVSA-2015:129
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 70935
- 70935
- USN-2397-1
- USN-2397-1
- https://support.apple.com/HT205267
- https://support.apple.com/HT205267
- https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/
- https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/
Modified: 2024-11-21
CVE-2014-8090
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
- http://advisories.mageia.org/MGASA-2014-0472.html
- http://advisories.mageia.org/MGASA-2014-0472.html
- APPLE-SA-2015-09-30-3
- APPLE-SA-2015-09-30-3
- openSUSE-SU-2014:1589
- openSUSE-SU-2014:1589
- openSUSE-SU-2015:0002
- openSUSE-SU-2015:0002
- openSUSE-SU-2015:0007
- openSUSE-SU-2015:0007
- RHSA-2014:1911
- RHSA-2014:1911
- RHSA-2014:1912
- RHSA-2014:1912
- RHSA-2014:1913
- RHSA-2014:1913
- RHSA-2014:1914
- RHSA-2014:1914
- 59948
- 59948
- 62050
- 62050
- 62748
- 62748
- DSA-3157
- DSA-3157
- DSA-3159
- DSA-3159
- MDVSA-2015:129
- MDVSA-2015:129
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 71230
- 71230
- USN-2412-1
- USN-2412-1
- https://support.apple.com/HT205267
- https://support.apple.com/HT205267
- https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/
- https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/
Modified: 2024-11-21
CVE-2015-1855
verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.
- http://www.debian.org/security/2015/dsa-3245
- http://www.debian.org/security/2015/dsa-3245
- http://www.debian.org/security/2015/dsa-3246
- http://www.debian.org/security/2015/dsa-3246
- http://www.debian.org/security/2015/dsa-3247
- http://www.debian.org/security/2015/dsa-3247
- https://bugs.ruby-lang.org/issues/9644
- https://bugs.ruby-lang.org/issues/9644
- https://puppetlabs.com/security/cve/cve-2015-1855
- https://puppetlabs.com/security/cve/cve-2015-1855
- https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/
- https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/
Modified: 2024-11-21
CVE-2015-3900
RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
- http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html
- http://blog.rubygems.org/2015/05/14/CVE-2015-3900.html
- FEDORA-2015-12501
- FEDORA-2015-12501
- FEDORA-2015-12574
- FEDORA-2015-12574
- FEDORA-2015-13157
- FEDORA-2015-13157
- RHSA-2015:1657
- RHSA-2015:1657
- [oss-security] 20150626 rubygems <2.4.8 vulnerable to DNS request hijacking (CVE-2015-3900 and CVE-2015-4020)
- [oss-security] 20150626 rubygems <2.4.8 vulnerable to DNS request hijacking (CVE-2015-3900 and CVE-2015-4020)
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 75482
- 75482
- https://puppet.com/security/cve/CVE-2015-3900
- https://puppet.com/security/cve/CVE-2015-3900
- https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356
- https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
Modified: 2024-11-21
CVE-2015-7551
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796344
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796344
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796551
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796551
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 76060
- 76060
- RHSA-2018:0583
- RHSA-2018:0583
- https://github.com/ruby/ruby/commit/339e11a7f178312d937b7c95dd3115ce7236597a
- https://github.com/ruby/ruby/commit/339e11a7f178312d937b7c95dd3115ce7236597a
- https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7551.html
- https://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7551.html
- https://puppet.com/security/cve/ruby-dec-2015-security-fixes
- https://puppet.com/security/cve/ruby-dec-2015-security-fixes
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
- https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
- https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
Modified: 2024-11-21
CVE-2019-16254
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/331984
- https://hackerone.com/reports/331984
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- DSA-4586
- DSA-4586
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.ruby-lang.org/ja/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/
- https://www.ruby-lang.org/ja/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
Modified: 2024-11-21
CVE-2020-5247
In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
- https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v
- https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v
- [debian-lts-announce] 20220525 [SECURITY] [DLA 3023-1] puma security update
- [debian-lts-announce] 20220525 [SECURITY] [DLA 3023-1] puma security update
- FEDORA-2020-fd87f90634
- FEDORA-2020-fd87f90634
- FEDORA-2020-08092b4c97
- FEDORA-2020-08092b4c97
- FEDORA-2020-a3f26a9387
- FEDORA-2020-a3f26a9387
- https://owasp.org/www-community/attacks/HTTP_Response_Splitting
- https://owasp.org/www-community/attacks/HTTP_Response_Splitting
- https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254
- https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254