{"id":"RHSA-2018:3731","summary":"Red Hat Security Advisory: rh-ruby25-ruby security, bug fix, and enhancement update","modified":"2026-03-11T07:14:24.986160Z","published":"2024-09-13T19:50:00Z","upstream":["CVE-2017-17742","CVE-2018-1000073","CVE-2018-1000074","CVE-2018-1000075","CVE-2018-1000076","CVE-2018-1000077","CVE-2018-1000078","CVE-2018-1000079","CVE-2018-16395","CVE-2018-16396","CVE-2018-6914","CVE-2018-8777","CVE-2018-8778","CVE-2018-8779","CVE-2018-8780"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3731"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547418"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547419"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547420"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547421"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547422"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547426"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561947"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561948"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561950"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561952"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561953"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1643086"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1643089"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1650588"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3731.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-17742"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-17742"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17742"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-6914"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-6914"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-6914"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-8777"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-8777"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8777"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-8778"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-8778"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8778"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-8779"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-8779"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8779"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-8780"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-8780"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8780"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-16395"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-16395"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16395"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-16396"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-16396"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-16396"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/10/17/not-propagated-taint-flag-in-some-formats-of-pack-cve-2018-16396/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000073"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000073"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000074"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000074"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000074"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000075"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000075"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000075"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000076"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000076"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000076"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000077"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000077"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000077"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000078"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000078"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000078"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000079"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000079"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000079"}],"affected":[{"package":{"name":"rh-ruby25-ruby","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-ruby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.3-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-ruby-debuginfo","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-ruby-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.3-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-ruby-devel","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-ruby-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.3-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-ruby-doc","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-ruby-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.3-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-ruby-irb","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-ruby-irb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.3-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-ruby-libs","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-ruby-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.3-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-bigdecimal","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-bigdecimal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.3.4-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-did_you_mean","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-did_you_mean"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.0-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-io-console","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-io-console"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.6-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-json","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-json"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.1.0-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-minitest","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-minitest"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.10.3-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-net-telnet","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-net-telnet"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.1.1-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-openssl","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-openssl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.1.2-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-power_assert","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-power_assert"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.1-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-psych","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-psych"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.2-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-rake","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-rake"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:12.3.0-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-rdoc","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-rdoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.0.1-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-test-unit","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-test-unit"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.2.7-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygem-xmlrpc","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygem-xmlrpc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.3.0-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygems","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygems"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.6-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}},{"package":{"name":"rh-ruby25-rubygems-devel","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby25-rubygems-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.7.6-6.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3731.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}