|Category:||Huawei EulerOS Local Security Checks|
|Title:||Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2020-2439)|
|Summary:||The remote host is missing an update for the Huawei EulerOS; 'ruby' package(s) announced via the EulerOS-SA-2020-2439 advisory.|
The remote host is missing an update for the Huawei EulerOS
'ruby' package(s) announced via the EulerOS-SA-2020-2439 advisory.
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.(CVE-2020-25613)
Onigmo through 6.2.0 has an out-of-bounds read in parse_char_class because of missing codepoint validation in regenc.c.(CVE-2019-16162)
Onigmo through 6.2.0 has a NULL pointer dereference in onig_error_code_to_str because of fetch_token in regparse.c.(CVE-2019-16161)
'ruby' package(s) on Huawei EulerOS V2.0SP9(x86_64).
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2019-16161|
Common Vulnerability Exposure (CVE) ID: CVE-2019-16162
Common Vulnerability Exposure (CVE) ID: CVE-2020-25613
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.