MGASA-2019-0408

Source
https://advisories.mageia.org/MGASA-2019-0408.html
Import Source
https://advisories.mageia.org/MGASA-2019-0408.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2019-0408
Related
Published
2019-12-25T19:08:41Z
Modified
2019-12-25T18:51:53Z
Summary
Updated ruby packages fix security vulnerabilities
Details

Updated ruby packages fix security vulnerabilities:

It was discovered that Ruby incorrectly handled certain files. An attacker could possibly use this issue to pass path matching what can lead to an unauthorized access (CVE-2019-15845).

It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could use this issue to cause a denial of service (CVE-2019-16201).

It was discovered that Ruby incorrectly handled certain HTTP headers. An attacker could possibly use this issue to execute arbitrary code (CVE-2019-16254).

It was discovered that Ruby incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code (CVE-2019-16255).

References
Credits

Affected packages

Mageia:7 / ruby

Package

Name
ruby
Purl
pkg:rpm/mageia/ruby?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.7-20.mga7

Ecosystem specific

{
    "section": "core"
}