{"id":"RHSA-2022:0708","summary":"Red Hat Security Advisory: rh-ruby26-ruby security, bug fix, and enhancement update","modified":"2025-11-22T12:30:41Z","published":"2024-09-13T20:33:46Z","upstream":["CVE-2020-36327","CVE-2021-31799","CVE-2021-31810","CVE-2021-32066","CVE-2021-41817","CVE-2021-41819"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:0708"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"ARTICLE","url":"https://access.redhat.com/articles/6206172"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1958999"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980126"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980128"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1980132"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2025104"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2026757"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0708.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2020-36327"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2020-36327"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36327"},{"type":"ARTICLE","url":"https://www.zofrex.com/blog/2021/04/29/bundler-still-vulnerable-dependency-confusion-cve-2020-36327/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-31799"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-31799"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31799"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-31810"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-31810"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31810"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-32066"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-32066"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-32066"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2021/07/07/starttls-stripping-in-net-imap/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-41817"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-41817"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41817"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-41819"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-41819"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41819"}],"affected":[{"package":{"name":"rh-ruby26-ruby","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-ruby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.6.9-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-ruby-debuginfo","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-ruby-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.6.9-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-ruby-devel","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-ruby-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.6.9-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-ruby-doc","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-ruby-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.6.9-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-ruby-libs","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-ruby-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.6.9-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-bigdecimal","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-bigdecimal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.4.1-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-bundler","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-bundler"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.17.2-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-did_you_mean","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-did_you_mean"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.3.0-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-io-console","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-io-console"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.7-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-irb","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-irb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.0.0-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-json","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-json"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.1.0-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-minitest","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-minitest"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.11.3-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-net-telnet","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-net-telnet"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.2.0-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-openssl","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-openssl"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.1.2-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-power_assert","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-power_assert"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.1.3-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-psych","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-psych"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.1.0-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-rake","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-rake"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:12.3.3-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-rdoc","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-rdoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.1.2.1-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-test-unit","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-test-unit"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.2.9-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygem-xmlrpc","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygem-xmlrpc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.3.0-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygems","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygems"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.3.1-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}},{"package":{"name":"rh-ruby26-rubygems-devel","ecosystem":"Red Hat:rhel_software_collections:3::el7","purl":"pkg:rpm/redhat/rh-ruby26-rubygems-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.3.1-120.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0708.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}