ALT-PU-2018-1791-1
Closed vulnerabilities
BDU:2019-04036
Уязвимость методов Dir.open, Dir.new, Dir.entries и Dir.empty интерпретатора языка программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным или оказать воздействие на целостность защищаемой информации
BDU:2019-04156
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю внедрить произвольные HTTP-заголовки
BDU:2019-04470
Уязвимость метода Dir.mktmpdir библиотеки tmpdir интерпретатора языка программирования Ruby, позволяющая нарушителю записать произвольные файлы в файловую систему
BDU:2019-04471
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04472
Уязвимость метода String#unpack интерпретатора языка программирования Ruby, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-04473
Уязвимость методов UNIXServer.open и UNIXSocket.open интерпретатора языка программирования Ruby, позволяющая нарушителю обойти ограничения безопасности
Modified: 2024-11-21
CVE-2017-17742
Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103684
- 103684
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- USN-3685-1
- USN-3685-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
- https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-6914
Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103686
- 103686
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
- https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
Modified: 2024-11-21
CVE-2018-8777
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103683
- 103683
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- RHSA-2020:0542
- RHSA-2020:0542
- RHSA-2020:0591
- RHSA-2020:0591
- RHSA-2020:0663
- RHSA-2020:0663
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3685-1
- USN-3685-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
- https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-8778
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103693
- 103693
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
- https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-8779
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103767
- 103767
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-8780
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103739
- 103739
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- RHSA-2020:0542
- RHSA-2020:0542
- RHSA-2020:0591
- RHSA-2020:0591
- RHSA-2020:0663
- RHSA-2020:0663
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/