-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2542
                  SUSE-SU-2019:1804-1 Security update for
                   ruby-bundled-gems-rpmhelper, ruby2.5
                               11 July 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           ruby-bundled-gems-rpmhelper
                   ruby2.5
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Create Arbitrary Files          -- Remote/Unauthenticated      
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Scripting            -- Remote with User Interaction
                   Provide Misleading Information  -- Remote/Unauthenticated      
                   Access Confidential Data        -- Remote/Unauthenticated      
                   Reduced Security                -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-8325 CVE-2019-8324 CVE-2019-8323
                   CVE-2019-8322 CVE-2019-8321 CVE-2019-8320
                   CVE-2018-1000079 CVE-2018-1000078 CVE-2018-1000077
                   CVE-2018-1000076 CVE-2018-1000075 CVE-2018-1000074
                   CVE-2018-1000073 CVE-2018-16396 CVE-2018-16395
                   CVE-2018-8780 CVE-2018-8779 CVE-2018-8778
                   CVE-2018-8777 CVE-2018-6914 CVE-2017-17742

Reference:         ASB-2019.0059.2
                   ESB-2019.2071
                   ESB-2019.1805
                   ESB-2019.1674

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2019/suse-su-20191804-1.html

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for ruby-bundled-gems-rpmhelper, ruby2.5

______________________________________________________________________________

Announcement ID:   SUSE-SU-2019:1804-1
Rating:            important
References:        #1082007 #1082008 #1082009 #1082010 #1082011 #1082014
                   #1082058 #1087433 #1087434 #1087436 #1087437 #1087440
                   #1087441 #1112530 #1112532 #1130028 #1130611 #1130617
                   #1130620 #1130622 #1130623 #1130627 #1133790
Cross-References:  CVE-2017-17742 CVE-2018-1000073 CVE-2018-1000074
                   CVE-2018-1000075 CVE-2018-1000076 CVE-2018-1000077
                   CVE-2018-1000078 CVE-2018-1000079 CVE-2018-16395
                   CVE-2018-16396 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778
                   CVE-2018-8779 CVE-2018-8780 CVE-2019-8320 CVE-2019-8321
                   CVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325
Affected Products:
                   SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
                   SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
                   SUSE Linux Enterprise Module for Basesystem 15-SP1
                   SUSE Linux Enterprise Module for Basesystem 15
______________________________________________________________________________

An update that solves 21 vulnerabilities and has two fixes is now available.

Description:

This update for ruby2.5 and ruby-bundled-gems-rpmhelper fixes the following
issues:
Changes in ruby2.5:
Update to 2.5.5 and 2.5.4:
https://www.ruby-lang.org/en/news/2019/03/15/ruby-2-5-5-released/ https://
www.ruby-lang.org/en/news/2019/03/13/ruby-2-5-4-released/
Security issues fixed:

  o CVE-2019-8320: Delete directory using symlink when decompressing tar (bsc#
    1130627)
  o CVE-2019-8321: Escape sequence injection vulnerability in verbose (bsc#
    1130623)
  o CVE-2019-8322: Escape sequence injection vulnerability in gem owner (bsc#
    1130622)
  o CVE-2019-8323: Escape sequence injection vulnerability in API response
    handling (bsc#1130620)
  o CVE-2019-8324: Installing a malicious gem may lead to arbitrary code
    execution (bsc#1130617)
  o CVE-2019-8325: Escape sequence injection vulnerability in errors (bsc#
    1130611)

Ruby 2.5 was updated to 2.5.3:
This release includes some bug fixes and some security fixes.
Security issues fixed:

  o CVE-2018-16396: Tainted flags are not propagated in Array#pack and String#
    unpack with some directives (bsc#1112532)
  o CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly
    (bsc#1112530)


Ruby 2.5 was updated to 2.5.1:
This release includes some bug fixes and some security fixes.
Security issues fixed:

  o CVE-2017-17742: HTTP response splitting in WEBrick (bsc#1087434)
  o CVE-2018-6914: Unintentional file and directory creation with directory
    traversal in tempfile and tmpdir (bsc#1087441)
  o CVE-2018-8777: DoS by large request in WEBrick (bsc#1087436)
  o CVE-2018-8778: Buffer under-read in String#unpack (bsc#1087433)
  o CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in
    UNIXServer and UNIXSocket (bsc#1087440)
  o CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in
    Dir (bsc#1087437)


  o Multiple vulnerabilities in RubyGems were fixed:


- - CVE-2018-1000079: Fixed path traversal issue during gem installation allows
to write to arbitrary filesystem locations (bsc#1082058) - CVE-2018-1000075:
Fixed infinite loop vulnerability due to negative size in tar header causes
Denial of Service (bsc#1082014) - CVE-2018-1000078: Fixed XSS vulnerability in
homepage attribute when displayed via gem server (bsc#1082011) -
CVE-2018-1000077: Fixed that missing URL validation on spec home attribute
allows malicious gem to set an invalid homepage URL (bsc#1082010) -
CVE-2018-1000076: Fixed improper verification of signatures in tarball allows
to install mis-signed gem (bsc#1082009) - CVE-2018-1000074: Fixed unsafe Object
Deserialization Vulnerability in gem owner allowing arbitrary code execution on
specially crafted YAML (bsc#1082008) - CVE-2018-1000073: Fixed path traversal
when writing to a symlinked basedir outside of the root (bsc#1082007)
Other changes:

  o Fixed Net::POPMail methods modify frozen literal when using default arg
  o ruby: change over of the Japanese Era to the new emperor May 1st 2019 (bsc#
    1133790)
  o build with PIE support (bsc#1130028)

Changes in ruby-bundled-gems-rpmhelper:

  o Add a new helper for bundled ruby gems.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Open Buildservice Development Tools
    15-SP1:
    zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1804=1
  o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15:
    zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2019-1804=1
  o SUSE Linux Enterprise Module for Basesystem 15-SP1:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2019-1804=1
  o SUSE Linux Enterprise Module for Basesystem 15:
    zypper in -t patch SUSE-SLE-Module-Basesystem-15-2019-1804=1

Package List:

  o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
    (aarch64 ppc64le s390x x86_64):
       ruby2.5-debuginfo-2.5.5-4.3.1
       ruby2.5-debugsource-2.5.5-4.3.1
       ruby2.5-doc-2.5.5-4.3.1
  o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1
    (noarch):
       ruby2.5-doc-ri-2.5.5-4.3.1
  o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
    (aarch64 ppc64le s390x x86_64):
       ruby2.5-debuginfo-2.5.5-4.3.1
       ruby2.5-debugsource-2.5.5-4.3.1
       ruby2.5-doc-2.5.5-4.3.1
  o SUSE Linux Enterprise Module for Open Buildservice Development Tools 15
    (noarch):
       ruby2.5-doc-ri-2.5.5-4.3.1
  o SUSE Linux Enterprise Module for Basesystem 15-SP1 (aarch64 ppc64le s390x
    x86_64):
       libruby2_5-2_5-2.5.5-4.3.1
       libruby2_5-2_5-debuginfo-2.5.5-4.3.1
       ruby2.5-2.5.5-4.3.1
       ruby2.5-debuginfo-2.5.5-4.3.1
       ruby2.5-debugsource-2.5.5-4.3.1
       ruby2.5-devel-2.5.5-4.3.1
       ruby2.5-devel-extra-2.5.5-4.3.1
       ruby2.5-stdlib-2.5.5-4.3.1
       ruby2.5-stdlib-debuginfo-2.5.5-4.3.1
  o SUSE Linux Enterprise Module for Basesystem 15 (aarch64 ppc64le s390x
    x86_64):
       libruby2_5-2_5-2.5.5-4.3.1
       libruby2_5-2_5-debuginfo-2.5.5-4.3.1
       ruby2.5-2.5.5-4.3.1
       ruby2.5-debuginfo-2.5.5-4.3.1
       ruby2.5-debugsource-2.5.5-4.3.1
       ruby2.5-devel-2.5.5-4.3.1
       ruby2.5-devel-extra-2.5.5-4.3.1
       ruby2.5-stdlib-2.5.5-4.3.1
       ruby2.5-stdlib-debuginfo-2.5.5-4.3.1


References:

  o https://www.suse.com/security/cve/CVE-2017-17742.html
  o https://www.suse.com/security/cve/CVE-2018-1000073.html
  o https://www.suse.com/security/cve/CVE-2018-1000074.html
  o https://www.suse.com/security/cve/CVE-2018-1000075.html
  o https://www.suse.com/security/cve/CVE-2018-1000076.html
  o https://www.suse.com/security/cve/CVE-2018-1000077.html
  o https://www.suse.com/security/cve/CVE-2018-1000078.html
  o https://www.suse.com/security/cve/CVE-2018-1000079.html
  o https://www.suse.com/security/cve/CVE-2018-16395.html
  o https://www.suse.com/security/cve/CVE-2018-16396.html
  o https://www.suse.com/security/cve/CVE-2018-6914.html
  o https://www.suse.com/security/cve/CVE-2018-8777.html
  o https://www.suse.com/security/cve/CVE-2018-8778.html
  o https://www.suse.com/security/cve/CVE-2018-8779.html
  o https://www.suse.com/security/cve/CVE-2018-8780.html
  o https://www.suse.com/security/cve/CVE-2019-8320.html
  o https://www.suse.com/security/cve/CVE-2019-8321.html
  o https://www.suse.com/security/cve/CVE-2019-8322.html
  o https://www.suse.com/security/cve/CVE-2019-8323.html
  o https://www.suse.com/security/cve/CVE-2019-8324.html
  o https://www.suse.com/security/cve/CVE-2019-8325.html
  o https://bugzilla.suse.com/1082007
  o https://bugzilla.suse.com/1082008
  o https://bugzilla.suse.com/1082009
  o https://bugzilla.suse.com/1082010
  o https://bugzilla.suse.com/1082011
  o https://bugzilla.suse.com/1082014
  o https://bugzilla.suse.com/1082058
  o https://bugzilla.suse.com/1087433
  o https://bugzilla.suse.com/1087434
  o https://bugzilla.suse.com/1087436
  o https://bugzilla.suse.com/1087437
  o https://bugzilla.suse.com/1087440
  o https://bugzilla.suse.com/1087441
  o https://bugzilla.suse.com/1112530
  o https://bugzilla.suse.com/1112532
  o https://bugzilla.suse.com/1130028
  o https://bugzilla.suse.com/1130611
  o https://bugzilla.suse.com/1130617
  o https://bugzilla.suse.com/1130620
  o https://bugzilla.suse.com/1130622
  o https://bugzilla.suse.com/1130623
  o https://bugzilla.suse.com/1130627
  o https://bugzilla.suse.com/1133790

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=oMf3
-----END PGP SIGNATURE-----