{"id":"RHSA-2020:0663","summary":"Red Hat Security Advisory: ruby security update","modified":"2026-04-21T10:01:39Z","published":"2024-09-13T19:57:32Z","upstream":["CVE-2018-1000073","CVE-2018-1000074","CVE-2018-1000075","CVE-2018-1000076","CVE-2018-1000077","CVE-2018-1000078","CVE-2018-1000079","CVE-2018-8777","CVE-2018-8780"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2020:0663"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547418"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547419"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547420"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547421"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547422"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547425"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1547426"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561949"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1561950"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0663.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-8777"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-8777"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8777"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-8780"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-8780"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-8780"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000073"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000073"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000073"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000074"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000074"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000074"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000075"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000075"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000075"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000076"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000076"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000076"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000077"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000077"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000077"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000078"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000078"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000078"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-1000079"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-1000079"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-1000079"}],"affected":[{"package":{"name":"ruby","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/ruby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-debuginfo","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/ruby-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-devel","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/ruby-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-doc","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/ruby-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-irb","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/ruby-irb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-libs","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/ruby-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-tcltk","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/ruby-tcltk"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-bigdecimal","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/rubygem-bigdecimal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.0-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-io-console","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/rubygem-io-console"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.2-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-json","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/rubygem-json"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.7-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-minitest","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/rubygem-minitest"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.2-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-psych","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/rubygem-psych"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-rake","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/rubygem-rake"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.9.6-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-rdoc","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/rubygem-rdoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.0.0-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygems","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/rubygems"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.14.1-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygems-devel","ecosystem":"Red Hat:rhel_eus:7.6::computenode","purl":"pkg:rpm/redhat/rubygems-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.14.1-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/ruby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-debuginfo","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/ruby-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-devel","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/ruby-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-doc","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/ruby-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-irb","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/ruby-irb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-libs","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/ruby-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"ruby-tcltk","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/ruby-tcltk"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0.648-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-bigdecimal","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/rubygem-bigdecimal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.0-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-io-console","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/rubygem-io-console"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.2-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-json","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/rubygem-json"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.7.7-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-minitest","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/rubygem-minitest"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.3.2-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-psych","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/rubygem-psych"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.0-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-rake","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/rubygem-rake"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.9.6-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygem-rdoc","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/rubygem-rdoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.0.0-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygems","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/rubygems"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.14.1-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}},{"package":{"name":"rubygems-devel","ecosystem":"Red Hat:rhel_eus:7.6::server","purl":"pkg:rpm/redhat/rubygems-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.0.14.1-36.el7_6"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2020:0663.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}