安全公告详情

NS-SA-2026-0023

2026-03-04 16:02:58

简介

moderate: c-ares/ruby security update

严重级别

moderate

主题

An update for c-ares/ruby is now available for NewStart CGSL MAIN 6.06.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

c-ares:
ruby:


Security Fix(es):
c-ares: A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability.(CVE-2021-3672)
c-ares: bugfix
ruby: Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option(CVE-2008-1891)
ruby: CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function(CVE-2008-5189)
ruby: Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815(CVE-2012-5371)
ruby: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 6.06.01B6.

影响组件

  • c-ares
  • ruby

影响产品

  • CGSL MAIN 6.06 (SP)

更新包

{"fix":[{"product":"CGSL MAIN 6.06 (SP)","pkgs":[{"binary":["c-ares-1.13.0-6.zncgsl6.x86_64.rpm"],"source":"c-ares-1.13.0-6.zncgsl6.src.rpm"},{"binary":["rubygems-3.0.3.1-109.module+zncgsl6.6.0+10811+c4e2cb16.noarch.rpm","rubygem-bigdecimal-1.4.1-109.module+zncgsl6.6.0+10811+c4e2cb16.x86_64.rpm","rubygem-io-console-0.4.7-109.module+zncgsl6.6.0+10811+c4e2cb16.x86_64.rpm","rubygem-irb-1.0.0-109.module+zncgsl6.6.0+10811+c4e2cb16.noarch.rpm","rubygem-json-2.1.0-109.module+zncgsl6.6.0+10811+c4e2cb16.x86_64.rpm","rubygem-openssl-2.1.2-109.module+zncgsl6.6.0+10811+c4e2cb16.x86_64.rpm","rubygem-psych-3.1.0-109.module+zncgsl6.6.0+10811+c4e2cb16.x86_64.rpm","rubygem-rdoc-6.1.2.1-109.module+zncgsl6.6.0+10811+c4e2cb16.noarch.rpm","ruby-2.6.10-109.module+zncgsl6.6.0+10811+c4e2cb16.x86_64.rpm","ruby-libs-2.6.10-109.module+zncgsl6.6.0+10811+c4e2cb16.x86_64.rpm"],"source":"ruby-2.6.10-109.module+zncgsl6.6.0+10811+c4e2cb16.src.rpm"}]}]}

CVE

参考