Name | CVE-2021-31799 |
Description | In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2780-1, DSA-5066-1, ELA-495-1 |
Debian Bugs | 990815 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ruby2.1 (PTS) | jessie, jessie (lts) | 2.1.5-2+deb8u14 | fixed |
ruby2.3 (PTS) | stretch (security) | 2.3.3-1+deb9u11 | fixed |
stretch (lts), stretch | 2.3.3-1+deb9u12 | fixed | |
ruby2.5 (PTS) | buster, buster (lts) | 2.5.5-3+deb10u7 | fixed |
buster (security) | 2.5.5-3+deb10u6 | fixed | |
ruby2.7 (PTS) | bullseye | 2.7.4-1+deb11u1 | fixed |
bullseye (security) | 2.7.4-1+deb11u2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ruby2.1 | source | jessie | 2.1.5-2+deb8u12 | ELA-495-1 | ||
ruby2.1 | source | (unstable) | (unfixed) | |||
ruby2.3 | source | stretch | 2.3.3-1+deb9u10 | DLA-2780-1 | ||
ruby2.3 | source | (unstable) | (unfixed) | |||
ruby2.5 | source | buster | 2.5.5-3+deb10u4 | DSA-5066-1 | ||
ruby2.5 | source | (unstable) | (unfixed) | |||
ruby2.7 | source | (unstable) | 2.7.4-1 | 990815 |
Introduced in (rdoc): https://github.com/ruby/rdoc/commit/4a8b7bed7cd5647db92c620bc6f33e4c309d2212 (v3.11)
Fixed in (rdoc): https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7 (v6.3.1)
https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/
https://github.com/ruby/ruby/commit/b1c73f239fe9af97de837331849f55d67c27561e (master)
https://github.com/ruby/ruby/commit/483f303d02e768b69e476e0b9be4ab2f26389522 (2.7)