-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Important: rh-ruby23-ruby security, bug fix, and enhancement update Advisory ID: RHSA-2018:3729-01 Product: Red Hat Software Collections Advisory URL: https://access.redhat.com/errata/RHSA-2018:3729 Issue date: 2018-11-29 CVE Names: CVE-2017-17742 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780 CVE-2018-16395 CVE-2018-16396 CVE-2018-1000073 CVE-2018-1000074 CVE-2018-1000075 CVE-2018-1000076 CVE-2018-1000077 CVE-2018-1000078 CVE-2018-1000079 =====================================================================
1. Summary:
An update for rh-ruby23-ruby is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - noarch, x86_64 Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch, x86_64
3. Description:
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.
The following packages have been upgraded to a later upstream version: rh-ruby23-ruby (2.3.8), rh-ruby23-rubygems (2.5.2.3). (BZ#1650591)
Security Fix(es):
* ruby: OpenSSL::X509::Name equality check does not work correctly (CVE-2018-16395)
* ruby: HTTP response splitting in WEBrick (CVE-2017-17742)
* ruby: DoS by large request in WEBrick (CVE-2018-8777)
* ruby: Buffer under-read in String#unpack (CVE-2018-8778)
* ruby: Unintentional directory traversal by poisoned NULL byte in Dir (CVE-2018-8780)
* ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives (CVE-2018-16396)
* rubygems: Path traversal when writing to a symlinked basedir outside of the root (CVE-2018-1000073)
* rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (CVE-2018-1000074)
* rubygems: Improper verification of signatures in tarball allows to install mis-signed gem (CVE-2018-1000076)
* rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (CVE-2018-1000077)
* rubygems: XSS vulnerability in homepage attribute when displayed via gem server (CVE-2018-1000078)
* rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations (CVE-2018-1000079)
* ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (CVE-2018-6914)
* ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket (CVE-2018-8779)
* rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service (CVE-2018-1000075)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
4. Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Bugs fixed (https://bugzilla.redhat.com/):
1547418 - CVE-2018-1000073 rubygems: Path traversal when writing to a symlinked basedir outside of the root 1547419 - CVE-2018-1000074 rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML 1547420 - CVE-2018-1000075 rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service 1547421 - CVE-2018-1000076 rubygems: Improper verification of signatures in tarball allows to install mis-signed gem 1547422 - CVE-2018-1000077 rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL 1547425 - CVE-2018-1000078 rubygems: XSS vulnerability in homepage attribute when displayed via gem server 1547426 - CVE-2018-1000079 rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations 1561947 - CVE-2018-6914 ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir 1561948 - CVE-2018-8779 ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket 1561949 - CVE-2018-8780 ruby: Unintentional directory traversal by poisoned NULL byte in Dir 1561950 - CVE-2018-8777 ruby: DoS by large request in WEBrick 1561952 - CVE-2017-17742 ruby: HTTP response splitting in WEBrick 1561953 - CVE-2018-8778 ruby: Buffer under-read in String#unpack 1643086 - CVE-2018-16395 ruby: OpenSSL::X509::Name equality check does not work correctly 1643089 - CVE-2018-16396 ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives 1650591 - Rebase to the latest Ruby 2.3 point release [rhscl-3.2.z]
6. Package List:
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):
Source: rh-ruby23-ruby-2.3.8-69.el6.src.rpm
noarch: rh-ruby23-ruby-doc-2.3.8-69.el6.noarch.rpm rh-ruby23-ruby-irb-2.3.8-69.el6.noarch.rpm rh-ruby23-rubygem-minitest-5.8.5-69.el6.noarch.rpm rh-ruby23-rubygem-power_assert-0.2.6-69.el6.noarch.rpm rh-ruby23-rubygem-rake-10.4.2-69.el6.noarch.rpm rh-ruby23-rubygem-rdoc-4.2.1-69.el6.noarch.rpm rh-ruby23-rubygem-test-unit-3.1.5-69.el6.noarch.rpm rh-ruby23-rubygems-2.5.2.3-69.el6.noarch.rpm rh-ruby23-rubygems-devel-2.5.2.3-69.el6.noarch.rpm
x86_64: rh-ruby23-ruby-2.3.8-69.el6.x86_64.rpm rh-ruby23-ruby-debuginfo-2.3.8-69.el6.x86_64.rpm rh-ruby23-ruby-devel-2.3.8-69.el6.x86_64.rpm rh-ruby23-ruby-libs-2.3.8-69.el6.x86_64.rpm rh-ruby23-ruby-tcltk-2.3.8-69.el6.x86_64.rpm rh-ruby23-rubygem-bigdecimal-1.2.8-69.el6.x86_64.rpm rh-ruby23-rubygem-did_you_mean-1.0.0-69.el6.x86_64.rpm rh-ruby23-rubygem-io-console-0.4.5-69.el6.x86_64.rpm rh-ruby23-rubygem-json-1.8.3.1-69.el6.x86_64.rpm rh-ruby23-rubygem-net-telnet-0.1.1-69.el6.x86_64.rpm rh-ruby23-rubygem-psych-2.1.0.1-69.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):
Source: rh-ruby23-ruby-2.3.8-69.el6.src.rpm
noarch: rh-ruby23-ruby-doc-2.3.8-69.el6.noarch.rpm rh-ruby23-ruby-irb-2.3.8-69.el6.noarch.rpm rh-ruby23-rubygem-minitest-5.8.5-69.el6.noarch.rpm rh-ruby23-rubygem-power_assert-0.2.6-69.el6.noarch.rpm rh-ruby23-rubygem-rake-10.4.2-69.el6.noarch.rpm rh-ruby23-rubygem-rdoc-4.2.1-69.el6.noarch.rpm rh-ruby23-rubygem-test-unit-3.1.5-69.el6.noarch.rpm rh-ruby23-rubygems-2.5.2.3-69.el6.noarch.rpm rh-ruby23-rubygems-devel-2.5.2.3-69.el6.noarch.rpm
x86_64: rh-ruby23-ruby-2.3.8-69.el6.x86_64.rpm rh-ruby23-ruby-debuginfo-2.3.8-69.el6.x86_64.rpm rh-ruby23-ruby-devel-2.3.8-69.el6.x86_64.rpm rh-ruby23-ruby-libs-2.3.8-69.el6.x86_64.rpm rh-ruby23-ruby-tcltk-2.3.8-69.el6.x86_64.rpm rh-ruby23-rubygem-bigdecimal-1.2.8-69.el6.x86_64.rpm rh-ruby23-rubygem-did_you_mean-1.0.0-69.el6.x86_64.rpm rh-ruby23-rubygem-io-console-0.4.5-69.el6.x86_64.rpm rh-ruby23-rubygem-json-1.8.3.1-69.el6.x86_64.rpm rh-ruby23-rubygem-net-telnet-0.1.1-69.el6.x86_64.rpm rh-ruby23-rubygem-psych-2.1.0.1-69.el6.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):
Source: rh-ruby23-ruby-2.3.8-69.el7.src.rpm
noarch: rh-ruby23-ruby-doc-2.3.8-69.el7.noarch.rpm rh-ruby23-ruby-irb-2.3.8-69.el7.noarch.rpm rh-ruby23-rubygem-minitest-5.8.5-69.el7.noarch.rpm rh-ruby23-rubygem-power_assert-0.2.6-69.el7.noarch.rpm rh-ruby23-rubygem-rake-10.4.2-69.el7.noarch.rpm rh-ruby23-rubygem-rdoc-4.2.1-69.el7.noarch.rpm rh-ruby23-rubygem-test-unit-3.1.5-69.el7.noarch.rpm rh-ruby23-rubygems-2.5.2.3-69.el7.noarch.rpm rh-ruby23-rubygems-devel-2.5.2.3-69.el7.noarch.rpm
x86_64: rh-ruby23-ruby-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-debuginfo-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-devel-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-libs-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-tcltk-2.3.8-69.el7.x86_64.rpm rh-ruby23-rubygem-bigdecimal-1.2.8-69.el7.x86_64.rpm rh-ruby23-rubygem-did_you_mean-1.0.0-69.el7.x86_64.rpm rh-ruby23-rubygem-io-console-0.4.5-69.el7.x86_64.rpm rh-ruby23-rubygem-json-1.8.3.1-69.el7.x86_64.rpm rh-ruby23-rubygem-net-telnet-0.1.1-69.el7.x86_64.rpm rh-ruby23-rubygem-psych-2.1.0.1-69.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4):
Source: rh-ruby23-ruby-2.3.8-69.el7.src.rpm
noarch: rh-ruby23-ruby-doc-2.3.8-69.el7.noarch.rpm rh-ruby23-ruby-irb-2.3.8-69.el7.noarch.rpm rh-ruby23-rubygem-minitest-5.8.5-69.el7.noarch.rpm rh-ruby23-rubygem-power_assert-0.2.6-69.el7.noarch.rpm rh-ruby23-rubygem-rake-10.4.2-69.el7.noarch.rpm rh-ruby23-rubygem-rdoc-4.2.1-69.el7.noarch.rpm rh-ruby23-rubygem-test-unit-3.1.5-69.el7.noarch.rpm rh-ruby23-rubygems-2.5.2.3-69.el7.noarch.rpm rh-ruby23-rubygems-devel-2.5.2.3-69.el7.noarch.rpm
x86_64: rh-ruby23-ruby-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-debuginfo-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-devel-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-libs-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-tcltk-2.3.8-69.el7.x86_64.rpm rh-ruby23-rubygem-bigdecimal-1.2.8-69.el7.x86_64.rpm rh-ruby23-rubygem-did_you_mean-1.0.0-69.el7.x86_64.rpm rh-ruby23-rubygem-io-console-0.4.5-69.el7.x86_64.rpm rh-ruby23-rubygem-json-1.8.3.1-69.el7.x86_64.rpm rh-ruby23-rubygem-net-telnet-0.1.1-69.el7.x86_64.rpm rh-ruby23-rubygem-psych-2.1.0.1-69.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5):
Source: rh-ruby23-ruby-2.3.8-69.el7.src.rpm
noarch: rh-ruby23-ruby-doc-2.3.8-69.el7.noarch.rpm rh-ruby23-ruby-irb-2.3.8-69.el7.noarch.rpm rh-ruby23-rubygem-minitest-5.8.5-69.el7.noarch.rpm rh-ruby23-rubygem-power_assert-0.2.6-69.el7.noarch.rpm rh-ruby23-rubygem-rake-10.4.2-69.el7.noarch.rpm rh-ruby23-rubygem-rdoc-4.2.1-69.el7.noarch.rpm rh-ruby23-rubygem-test-unit-3.1.5-69.el7.noarch.rpm rh-ruby23-rubygems-2.5.2.3-69.el7.noarch.rpm rh-ruby23-rubygems-devel-2.5.2.3-69.el7.noarch.rpm
x86_64: rh-ruby23-ruby-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-debuginfo-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-devel-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-libs-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-tcltk-2.3.8-69.el7.x86_64.rpm rh-ruby23-rubygem-bigdecimal-1.2.8-69.el7.x86_64.rpm rh-ruby23-rubygem-did_you_mean-1.0.0-69.el7.x86_64.rpm rh-ruby23-rubygem-io-console-0.4.5-69.el7.x86_64.rpm rh-ruby23-rubygem-json-1.8.3.1-69.el7.x86_64.rpm rh-ruby23-rubygem-net-telnet-0.1.1-69.el7.x86_64.rpm rh-ruby23-rubygem-psych-2.1.0.1-69.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6):
Source: rh-ruby23-ruby-2.3.8-69.el7.src.rpm
noarch: rh-ruby23-ruby-doc-2.3.8-69.el7.noarch.rpm rh-ruby23-ruby-irb-2.3.8-69.el7.noarch.rpm rh-ruby23-rubygem-minitest-5.8.5-69.el7.noarch.rpm rh-ruby23-rubygem-power_assert-0.2.6-69.el7.noarch.rpm rh-ruby23-rubygem-rake-10.4.2-69.el7.noarch.rpm rh-ruby23-rubygem-rdoc-4.2.1-69.el7.noarch.rpm rh-ruby23-rubygem-test-unit-3.1.5-69.el7.noarch.rpm rh-ruby23-rubygems-2.5.2.3-69.el7.noarch.rpm rh-ruby23-rubygems-devel-2.5.2.3-69.el7.noarch.rpm
x86_64: rh-ruby23-ruby-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-debuginfo-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-devel-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-libs-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-tcltk-2.3.8-69.el7.x86_64.rpm rh-ruby23-rubygem-bigdecimal-1.2.8-69.el7.x86_64.rpm rh-ruby23-rubygem-did_you_mean-1.0.0-69.el7.x86_64.rpm rh-ruby23-rubygem-io-console-0.4.5-69.el7.x86_64.rpm rh-ruby23-rubygem-json-1.8.3.1-69.el7.x86_64.rpm rh-ruby23-rubygem-net-telnet-0.1.1-69.el7.x86_64.rpm rh-ruby23-rubygem-psych-2.1.0.1-69.el7.x86_64.rpm
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-ruby23-ruby-2.3.8-69.el7.src.rpm
noarch: rh-ruby23-ruby-doc-2.3.8-69.el7.noarch.rpm rh-ruby23-ruby-irb-2.3.8-69.el7.noarch.rpm rh-ruby23-rubygem-minitest-5.8.5-69.el7.noarch.rpm rh-ruby23-rubygem-power_assert-0.2.6-69.el7.noarch.rpm rh-ruby23-rubygem-rake-10.4.2-69.el7.noarch.rpm rh-ruby23-rubygem-rdoc-4.2.1-69.el7.noarch.rpm rh-ruby23-rubygem-test-unit-3.1.5-69.el7.noarch.rpm rh-ruby23-rubygems-2.5.2.3-69.el7.noarch.rpm rh-ruby23-rubygems-devel-2.5.2.3-69.el7.noarch.rpm
x86_64: rh-ruby23-ruby-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-debuginfo-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-devel-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-libs-2.3.8-69.el7.x86_64.rpm rh-ruby23-ruby-tcltk-2.3.8-69.el7.x86_64.rpm rh-ruby23-rubygem-bigdecimal-1.2.8-69.el7.x86_64.rpm rh-ruby23-rubygem-did_you_mean-1.0.0-69.el7.x86_64.rpm rh-ruby23-rubygem-io-console-0.4.5-69.el7.x86_64.rpm rh-ruby23-rubygem-json-1.8.3.1-69.el7.x86_64.rpm rh-ruby23-rubygem-net-telnet-0.1.1-69.el7.x86_64.rpm rh-ruby23-rubygem-psych-2.1.0.1-69.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2017-17742 https://access.redhat.com/security/cve/CVE-2018-6914 https://access.redhat.com/security/cve/CVE-2018-8777 https://access.redhat.com/security/cve/CVE-2018-8778 https://access.redhat.com/security/cve/CVE-2018-8779 https://access.redhat.com/security/cve/CVE-2018-8780 https://access.redhat.com/security/cve/CVE-2018-16395 https://access.redhat.com/security/cve/CVE-2018-16396 https://access.redhat.com/security/cve/CVE-2018-1000073 https://access.redhat.com/security/cve/CVE-2018-1000074 https://access.redhat.com/security/cve/CVE-2018-1000075 https://access.redhat.com/security/cve/CVE-2018-1000076 https://access.redhat.com/security/cve/CVE-2018-1000077 https://access.redhat.com/security/cve/CVE-2018-1000078 https://access.redhat.com/security/cve/CVE-2018-1000079 https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBW/+32dzjgjWX9erEAQjkHg//Q5qOX6tHjNsaDtg/8OuapkfyTgkL+k6Z HfoRyjJI3i3eKO2gskZSdWbkDYddpjJVKntLxOZth8NFa5O4MT03gyg7jbeZnXBC LyL5yfDQhJPH0UnRsAPbdym4SrPMSNox37sF7tk8VAbf8K7QEW2PukEOEhb+v9PC xzIOg1H7gpf/tcvubmwUzgX9AoDgVfRn24gMYYw7AfqI/Dm/O7exIAuCHCeqCHXc nK0KGSX7rImlUetTe6/FamM9oqeG+59a1c5KLdOtyAlsdf/fi2v9pQKwl3XkXZXl 7yT32sbaZPbju+B49gZzubncnHpkIgG2F51Ommiv9tt0QlUWhJXbZwxiuXL5kwxm N1ZcE9MqAt2nhrBSf+7Q8r2d39l0T69M1l+czhdpgBsnV3tBA/p/lILQz2NdUQTO VdsNSjRJ5VziCvj42KR0IE/ImNC8SrG6XZ0lcCTPseSE/O7SKP6UKR2clEPvvHjB oqt+FC61WTOD9T7dZ6Z6qZ57fp/VbB829FGJVo2R67CHHft2aGY1I/uztiffnpFU wrKBP4CyHhsipJbazI9e+1d1F3brRznbsAbKnpkoWuKKyFv1PP+uce1ai10GjEbE yUXXDpzHlflvofOtMBsKUB2NQ+C81Sz/dH7jmTjR4GBOPCBOnVbbDm7IhmOJw+Hk p7+QDKnpmoM= =8e8F -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
|