|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2021-36cdab1f8d (ruby)

From:  updates@fedoraproject.org
To:  package-announce@lists.fedoraproject.org
Subject:  [SECURITY] Fedora 34 Update: ruby-3.0.2-149.fc34
Date:  Thu, 29 Jul 2021 01:09:21 +0000
Message-ID:  <20210729010921.E71E730A5979@bastion01.iad2.fedoraproject.org>
Archive-link:  Article

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2021-36cdab1f8d 2021-07-29 01:06:35.173516 -------------------------------------------------------------------------------- Name : ruby Product : Fedora 34 Version : 3.0.2 Release : 149.fc34 URL : https://www.ruby-lang.org/ Summary : An interpreter of object-oriented scripting language Description : Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible. -------------------------------------------------------------------------------- Update Information: Security fix for CVE-2020-36327 CVE-2021-31799 CVE-2021-31810 CVE-2021-32066 -------------------------------------------------------------------------------- ChangeLog: * Tue Jul 13 2021 Jarek Prokop <jprokop@redhat.com> - 3.0.2-149 - Upgrade to Ruby 3.0.2. - Fix command injection vulnerability in RDoc. Resolves: CVE-2021-31799 - Fix FTP PASV command response can cause Net::FTP to connect to arbitrary host. Resolves: CVE-2021-31810 - Fix StartTLS stripping vulnerability in Net::IMAP. Resolves: CVE-2021-32066 - Fix dependencies of gems with explicit source installed from a different source. Resolves: CVE-2020-36327 -------------------------------------------------------------------------------- References: [ 1 ] Bug #1958999 - CVE-2020-36327 rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source https://bugzilla.redhat.com/show_bug.cgi?id=1958999 [ 2 ] Bug #1980126 - CVE-2021-31810 ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host https://bugzilla.redhat.com/show_bug.cgi?id=1980126 [ 3 ] Bug #1980128 - CVE-2021-32066 ruby: StartTLS stripping vulnerability in Net::IMAP https://bugzilla.redhat.com/show_bug.cgi?id=1980128 [ 4 ] Bug #1980132 - CVE-2021-31799 rubygem-rdoc: Command injection vulnerability in RDoc https://bugzilla.redhat.com/show_bug.cgi?id=1980132 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-36cdab1f8d' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgr... All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-cond... List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-ann... Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds