An update for ruby is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1306
Final
1.0
1.0
2021-08-06
Initial
2021-08-06
2021-08-06
openEuler SA Tool V1.0
2021-08-06
ruby security update
An update for ruby is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
Ruby is a fast and easy interpreted scripting language for object-oriented programming. It has many functions for processing text Files and perform system management tasks (such as Perl).
Security Fix(es):
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.(CVE-2021-31799)
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).(CVE-2021-31810)
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."(CVE-2021-32066)
An update for ruby is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
ruby
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1306
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-31799
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-31810
https://openeuler.org/en/security/cve/detail.html?id=CVE-2021-32066
https://nvd.nist.gov/vuln/detail/CVE-2021-31799
https://nvd.nist.gov/vuln/detail/CVE-2021-31810
https://nvd.nist.gov/vuln/detail/CVE-2021-32066
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
ruby-2.5.8-114.oe1.aarch64.rpm
rubygem-io-console-0.4.6-114.oe1.aarch64.rpm
rubygem-bigdecimal-1.3.4-114.oe1.aarch64.rpm
ruby-devel-2.5.8-114.oe1.aarch64.rpm
ruby-debugsource-2.5.8-114.oe1.aarch64.rpm
rubygem-json-2.1.0-114.oe1.aarch64.rpm
ruby-debuginfo-2.5.8-114.oe1.aarch64.rpm
rubygem-psych-3.0.2-114.oe1.aarch64.rpm
rubygem-openssl-2.1.2-114.oe1.aarch64.rpm
rubygem-psych-3.0.2-114.oe1.aarch64.rpm
rubygem-io-console-0.4.6-114.oe1.aarch64.rpm
ruby-devel-2.5.8-114.oe1.aarch64.rpm
ruby-2.5.8-114.oe1.aarch64.rpm
rubygem-json-2.1.0-114.oe1.aarch64.rpm
rubygem-bigdecimal-1.3.4-114.oe1.aarch64.rpm
rubygem-openssl-2.1.2-114.oe1.aarch64.rpm
ruby-debugsource-2.5.8-114.oe1.aarch64.rpm
ruby-debuginfo-2.5.8-114.oe1.aarch64.rpm
rubygem-xmlrpc-0.3.0-114.oe1.noarch.rpm
rubygem-test-unit-3.2.7-114.oe1.noarch.rpm
ruby-irb-2.5.8-114.oe1.noarch.rpm
rubygem-net-telnet-0.1.1-114.oe1.noarch.rpm
rubygem-rake-12.3.0-114.oe1.noarch.rpm
ruby-help-2.5.8-114.oe1.noarch.rpm
rubygems-2.7.6-114.oe1.noarch.rpm
rubygem-did_you_mean-1.2.0-114.oe1.noarch.rpm
rubygem-rdoc-6.0.1.1-114.oe1.noarch.rpm
rubygem-power_assert-1.1.1-114.oe1.noarch.rpm
rubygem-minitest-5.10.3-114.oe1.noarch.rpm
rubygems-devel-2.7.6-114.oe1.noarch.rpm
rubygem-rake-12.3.0-114.oe1.noarch.rpm
ruby-help-2.5.8-114.oe1.noarch.rpm
rubygem-power_assert-1.1.1-114.oe1.noarch.rpm
ruby-irb-2.5.8-114.oe1.noarch.rpm
rubygem-did_you_mean-1.2.0-114.oe1.noarch.rpm
rubygem-minitest-5.10.3-114.oe1.noarch.rpm
rubygem-xmlrpc-0.3.0-114.oe1.noarch.rpm
rubygem-rdoc-6.0.1.1-114.oe1.noarch.rpm
rubygem-net-telnet-0.1.1-114.oe1.noarch.rpm
rubygem-test-unit-3.2.7-114.oe1.noarch.rpm
rubygems-2.7.6-114.oe1.noarch.rpm
rubygems-devel-2.7.6-114.oe1.noarch.rpm
ruby-2.5.8-114.oe1.src.rpm
ruby-2.5.8-114.oe1.src.rpm
rubygem-json-2.1.0-114.oe1.x86_64.rpm
ruby-devel-2.5.8-114.oe1.x86_64.rpm
rubygem-bigdecimal-1.3.4-114.oe1.x86_64.rpm
rubygem-io-console-0.4.6-114.oe1.x86_64.rpm
rubygem-psych-3.0.2-114.oe1.x86_64.rpm
ruby-2.5.8-114.oe1.x86_64.rpm
ruby-debuginfo-2.5.8-114.oe1.x86_64.rpm
rubygem-openssl-2.1.2-114.oe1.x86_64.rpm
ruby-debugsource-2.5.8-114.oe1.x86_64.rpm
rubygem-json-2.1.0-114.oe1.x86_64.rpm
ruby-2.5.8-114.oe1.x86_64.rpm
rubygem-bigdecimal-1.3.4-114.oe1.x86_64.rpm
rubygem-openssl-2.1.2-114.oe1.x86_64.rpm
rubygem-psych-3.0.2-114.oe1.x86_64.rpm
ruby-devel-2.5.8-114.oe1.x86_64.rpm
ruby-debugsource-2.5.8-114.oe1.x86_64.rpm
ruby-debuginfo-2.5.8-114.oe1.x86_64.rpm
rubygem-io-console-0.4.6-114.oe1.x86_64.rpm
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
2021-08-06
CVE-2021-31799
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.5
AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
ruby security update
2021-08-06
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1306
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).
2021-08-06
CVE-2021-31810
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
Medium
5.4
AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
ruby security update
2021-08-06
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1306
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
2021-08-06
CVE-2021-32066
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
Medium
6.5
AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
ruby security update
2021-08-06
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1306