vulnerability
SUSE: CVE-2019-16255: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Oct 1, 2019 | Mar 21, 2020 | Oct 22, 2021 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Oct 1, 2019
Added
Mar 21, 2020
Modified
Oct 22, 2021
Description
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
Solutions
suse-upgrade-libruby2_1-2_1suse-upgrade-libruby2_5-2_5suse-upgrade-ruby2-1suse-upgrade-ruby2-1-develsuse-upgrade-ruby2-1-stdlibsuse-upgrade-ruby2-5suse-upgrade-ruby2-5-develsuse-upgrade-ruby2-5-devel-extrasuse-upgrade-ruby2-5-docsuse-upgrade-ruby2-5-doc-risuse-upgrade-ruby2-5-stdlibsuse-upgrade-yast2-ruby-bindings
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.