vulnerability
Red Hat: CVE-2019-15845: CVE-2019-15845 ruby: NUL injection vulnerability of File.fnmatch and File.fnmatch? (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | Nov 26, 2019 | Jun 30, 2021 | Feb 20, 2026 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Nov 26, 2019
Added
Jun 30, 2021
Modified
Feb 20, 2026
Description
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
Solutions
redhat-upgrade-rubyredhat-upgrade-ruby-debuginforedhat-upgrade-ruby-debugsourceredhat-upgrade-ruby-develredhat-upgrade-ruby-docredhat-upgrade-ruby-irbredhat-upgrade-ruby-libsredhat-upgrade-ruby-libs-debuginforedhat-upgrade-rubygem-abrtredhat-upgrade-rubygem-abrt-docredhat-upgrade-rubygem-bigdecimalredhat-upgrade-rubygem-bigdecimal-debuginforedhat-upgrade-rubygem-bsonredhat-upgrade-rubygem-bson-debuginforedhat-upgrade-rubygem-bson-debugsourceredhat-upgrade-rubygem-bson-docredhat-upgrade-rubygem-bundlerredhat-upgrade-rubygem-bundler-docredhat-upgrade-rubygem-did_you_meanredhat-upgrade-rubygem-io-consoleredhat-upgrade-rubygem-io-console-debuginforedhat-upgrade-rubygem-irbredhat-upgrade-rubygem-jsonredhat-upgrade-rubygem-json-debuginforedhat-upgrade-rubygem-minitestredhat-upgrade-rubygem-mongoredhat-upgrade-rubygem-mongo-docredhat-upgrade-rubygem-mysql2redhat-upgrade-rubygem-mysql2-debuginforedhat-upgrade-rubygem-mysql2-debugsourceredhat-upgrade-rubygem-mysql2-docredhat-upgrade-rubygem-net-telnetredhat-upgrade-rubygem-opensslredhat-upgrade-rubygem-openssl-debuginforedhat-upgrade-rubygem-pgredhat-upgrade-rubygem-pg-debuginforedhat-upgrade-rubygem-pg-debugsourceredhat-upgrade-rubygem-pg-docredhat-upgrade-rubygem-power_assertredhat-upgrade-rubygem-psychredhat-upgrade-rubygem-psych-debuginforedhat-upgrade-rubygem-rakeredhat-upgrade-rubygem-rdocredhat-upgrade-rubygem-test-unitredhat-upgrade-rubygem-xmlrpcredhat-upgrade-rubygemsredhat-upgrade-rubygems-devel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.