RHEL 6 / 7 : rh-ruby24-ruby (RHSA-2018:3730)
Discription

The remote Redhat Enterprise Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2018:3730 advisory. ruby: HTTP response splitting in WEBrick (CVE-2017-17742) ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (CVE-2018-6914) ruby: DoS by large request in WEBrick (CVE-2018-8777) ruby: Buffer under-read in String#unpack (CVE-2018-8778) ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket (CVE-2018-8779) ruby: Unintentional directory traversal by poisoned NULL byte in Dir (CVE-2018-8780) ruby: OpenSSL::X509::Name equality check does not work correctly (CVE-2018-16395) ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives (CVE-2018-16396) rubygems: Path traversal when writing to a symlinked basedir outside of the root (CVE-2018-1000073) rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (CVE-2018-1000074) rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service (CVE-2018-1000075) rubygems: Improper verification of signatures in tarball allows to install mis-signed gem (CVE-2018-1000076) rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (CVE-2018-1000077) rubygems: XSS…Read More

Back to Main

Subscribe for the latest news: