Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.2542 SUSE-SU-2019:1804-1 Security update for ruby-bundled-gems-rpmhelper, ruby2.5 11 July 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ruby-bundled-gems-rpmhelper ruby2.5 Publisher: SUSE Operating System: SUSE Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Create Arbitrary Files -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Cross-site Scripting -- Remote with User Interaction Provide Misleading Information -- Remote/Unauthenticated Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-8325 CVE-2019-8324 CVE-2019-8323 CVE-2019-8322 CVE-2019-8321 CVE-2019-8320 CVE-2018-1000079 CVE-2018-1000078 CVE-2018-1000077 CVE-2018-1000076 CVE-2018-1000075 CVE-2018-1000074 CVE-2018-1000073 CVE-2018-16396 CVE-2018-16395 CVE-2018-8780 CVE-2018-8779 CVE-2018-8778 CVE-2018-8777 CVE-2018-6914 CVE-2017-17742 Reference: ASB-2019.0059.2 ESB-2019.2071 ESB-2019.1805 ESB-2019.1674 Original Bulletin: https://www.suse.com/support/update/announcement/2019/suse-su-20191804-1.html - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Security Update: Security update for ruby-bundled-gems-rpmhelper, ruby2.5 ______________________________________________________________________________ Announcement ID: SUSE-SU-2019:1804-1 Rating: important References: #1082007 #1082008 #1082009 #1082010 #1082011 #1082014 #1082058 #1087433 #1087434 #1087436 #1087437 #1087440 #1087441 #1112530 #1112532 #1130028 #1130611 #1130617 #1130620 #1130622 #1130623 #1130627 #1133790 Cross-References: CVE-2017-17742 CVE-2018-1000073 CVE-2018-1000074 CVE-2018-1000075 CVE-2018-1000076 CVE-2018-1000077 CVE-2018-1000078 CVE-2018-1000079 CVE-2018-16395 CVE-2018-16396 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780 CVE-2019-8320 CVE-2019-8321 CVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325 Affected Products: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SUSE Linux Enterprise Module for Basesystem 15-SP1 SUSE Linux Enterprise Module for Basesystem 15 ______________________________________________________________________________ An update that solves 21 vulnerabilities and has two fixes is now available. Description: This update for ruby2.5 and ruby-bundled-gems-rpmhelper fixes the following issues: Changes in ruby2.5: Update to 2.5.5 and 2.5.4: https://www.ruby-lang.org/en/news/2019/03/15/ruby-2-5-5-released/ https:// www.ruby-lang.org/en/news/2019/03/13/ruby-2-5-4-released/ Security issues fixed: o CVE-2019-8320: Delete directory using symlink when decompressing tar (bsc# 1130627) o CVE-2019-8321: Escape sequence injection vulnerability in verbose (bsc# 1130623) o CVE-2019-8322: Escape sequence injection vulnerability in gem owner (bsc# 1130622) o CVE-2019-8323: Escape sequence injection vulnerability in API response handling (bsc#1130620) o CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution (bsc#1130617) o CVE-2019-8325: Escape sequence injection vulnerability in errors (bsc# 1130611) Ruby 2.5 was updated to 2.5.3: This release includes some bug fixes and some security fixes. Security issues fixed: o CVE-2018-16396: Tainted flags are not propagated in Array#pack and String# unpack with some directives (bsc#1112532) o CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly (bsc#1112530) Ruby 2.5 was updated to 2.5.1: This release includes some bug fixes and some security fixes. Security issues fixed: o CVE-2017-17742: HTTP response splitting in WEBrick (bsc#1087434) o CVE-2018-6914: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441) o CVE-2018-8777: DoS by large request in WEBrick (bsc#1087436) o CVE-2018-8778: Buffer under-read in String#unpack (bsc#1087433) o CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440) o CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437) o Multiple vulnerabilities in RubyGems were fixed: - - CVE-2018-1000079: Fixed path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058) - CVE-2018-1000075: Fixed infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014) - CVE-2018-1000078: Fixed XSS vulnerability in homepage attribute when displayed via gem server (bsc#1082011) - CVE-2018-1000077: Fixed that missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (bsc#1082010) - CVE-2018-1000076: Fixed improper verification of signatures in tarball allows to install mis-signed gem (bsc#1082009) - CVE-2018-1000074: Fixed unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (bsc#1082008) - CVE-2018-1000073: Fixed path traversal when writing to a symlinked basedir outside of the root (bsc#1082007) Other changes: o Fixed Net::POPMail methods modify frozen literal when using default arg o ruby: change over of the Japanese Era to the new emperor May 1st 2019 (bsc# 1133790) o build with PIE support (bsc#1130028) Changes in ruby-bundled-gems-rpmhelper: o Add a new helper for bundled ruby gems. Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1: zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1804=1 o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15: zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-1804=1 o SUSE Linux Enterprise Module for Basesystem 15-SP1: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2019-1804=1 o SUSE Linux Enterprise Module for Basesystem 15: zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-1804=1 Package List: o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (aarch64 ppc64le s390x x86_64): ruby2.5-debuginfo-2.5.5-4.3.1 ruby2.5-debugsource-2.5.5-4.3.1 ruby2.5-doc-2.5.5-4.3.1 o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (noarch): ruby2.5-doc-ri-2.5.5-4.3.1 o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64): ruby2.5-debuginfo-2.5.5-4.3.1 ruby2.5-debugsource-2.5.5-4.3.1 ruby2.5-doc-2.5.5-4.3.1 o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (noarch): ruby2.5-doc-ri-2.5.5-4.3.1 o SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x x86_64): libruby2_5-2_5-2.5.5-4.3.1 libruby2_5-2_5-debuginfo-2.5.5-4.3.1 ruby2.5-2.5.5-4.3.1 ruby2.5-debuginfo-2.5.5-4.3.1 ruby2.5-debugsource-2.5.5-4.3.1 ruby2.5-devel-2.5.5-4.3.1 ruby2.5-devel-extra-2.5.5-4.3.1 ruby2.5-stdlib-2.5.5-4.3.1 ruby2.5-stdlib-debuginfo-2.5.5-4.3.1 o SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x x86_64): libruby2_5-2_5-2.5.5-4.3.1 libruby2_5-2_5-debuginfo-2.5.5-4.3.1 ruby2.5-2.5.5-4.3.1 ruby2.5-debuginfo-2.5.5-4.3.1 ruby2.5-debugsource-2.5.5-4.3.1 ruby2.5-devel-2.5.5-4.3.1 ruby2.5-devel-extra-2.5.5-4.3.1 ruby2.5-stdlib-2.5.5-4.3.1 ruby2.5-stdlib-debuginfo-2.5.5-4.3.1 References: o https://www.suse.com/security/cve/CVE-2017-17742.html o https://www.suse.com/security/cve/CVE-2018-1000073.html o https://www.suse.com/security/cve/CVE-2018-1000074.html o https://www.suse.com/security/cve/CVE-2018-1000075.html o https://www.suse.com/security/cve/CVE-2018-1000076.html o https://www.suse.com/security/cve/CVE-2018-1000077.html o https://www.suse.com/security/cve/CVE-2018-1000078.html o https://www.suse.com/security/cve/CVE-2018-1000079.html o https://www.suse.com/security/cve/CVE-2018-16395.html o https://www.suse.com/security/cve/CVE-2018-16396.html o https://www.suse.com/security/cve/CVE-2018-6914.html o https://www.suse.com/security/cve/CVE-2018-8777.html o https://www.suse.com/security/cve/CVE-2018-8778.html o https://www.suse.com/security/cve/CVE-2018-8779.html o https://www.suse.com/security/cve/CVE-2018-8780.html o https://www.suse.com/security/cve/CVE-2019-8320.html o https://www.suse.com/security/cve/CVE-2019-8321.html o https://www.suse.com/security/cve/CVE-2019-8322.html o https://www.suse.com/security/cve/CVE-2019-8323.html o https://www.suse.com/security/cve/CVE-2019-8324.html o https://www.suse.com/security/cve/CVE-2019-8325.html o https://bugzilla.suse.com/1082007 o https://bugzilla.suse.com/1082008 o https://bugzilla.suse.com/1082009 o https://bugzilla.suse.com/1082010 o https://bugzilla.suse.com/1082011 o https://bugzilla.suse.com/1082014 o https://bugzilla.suse.com/1082058 o https://bugzilla.suse.com/1087433 o https://bugzilla.suse.com/1087434 o https://bugzilla.suse.com/1087436 o https://bugzilla.suse.com/1087437 o https://bugzilla.suse.com/1087440 o https://bugzilla.suse.com/1087441 o https://bugzilla.suse.com/1112530 o https://bugzilla.suse.com/1112532 o https://bugzilla.suse.com/1130028 o https://bugzilla.suse.com/1130611 o https://bugzilla.suse.com/1130617 o https://bugzilla.suse.com/1130620 o https://bugzilla.suse.com/1130622 o https://bugzilla.suse.com/1130623 o https://bugzilla.suse.com/1130627 o https://bugzilla.suse.com/1133790 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXSaVMmaOgq3Tt24GAQhxSQ/+MBihtkZ8T/4PGXBx/zCoLTD6ui3y0C1c nx6LGypMsUH4tY63W9+MPiEyoVix2JQ1KyzaNxeios3pwX6Kxdh3qfy5A0SeZpU7 8t8PRpRtPFo+K851xEoQhKGPUI1MaB1H9hyMHZOD3ImRWJZ8CQfmAmh61ncdQ+du wQo+Hu3MLDDHWY7qlIDWTENdrvrnXcI7EysNvKfKPBvy3Ht0X+liEst7LFrb02oo Q7mlR9pJvuZI3XHwpWczueSVyHePSEhspe6M/gVjxPSw/ALkjRJlIGoJYQR1MRCs 5PGW3X1m2jUpmLGELGT3efnuCHgsDK+LvsOgMfiz9WHdhT1pMsKRZ65opiyyyUAz wSbDUWiKsu8WdnC61cvgW9qTsnZn5RqCqzr8jocPlTQgvVrTxFuZZGKmP3b+yMK3 u2iY+bBtrJyzr6vRHk6wUqqR7xOPe2SsTFkWdj/RJN+lRyE5Dl4v29sVa4S+k+IJ e8J2ucAf7tVbz270LGO8+DClUfDP9Q+8kZJD83d6+ohFj2bJ34CGwMOMkaG4b2uC KHtmOB5+jOq1WZ8KcJle0GIU47cCUexr6NKghNdg0MzjwHkzCzCO9GSwOs7HjlWW LBu2VBpTYZ8HzFaDHEK9osdPXYT3N7CmnlEo7MpJ/umEdgY4izJrVvnwnnXZooSx in0uIPfZVYI= =oMf3 -----END PGP SIGNATURE-----