Files
poky/meta/recipes-devtools
Yi Zhao 033ba67e53 ruby: Security fixes for CVE-2021-31810/CVE-2021-32066
CVE-2021-31810:
A malicious FTP server can use the PASV response to trick Net::FTP into
connecting back to a given IP address and port. This potentially makes
Net::FTP extract information about services that are otherwise private
and not disclosed (e.g., the attacker can conduct port scans and service
banner extractions).

CVE-2021-32066:
Net::IMAP does not raise an exception when StartTLS fails with an
unknown response, which might allow man-in-the-middle attackers to
bypass the TLS protections by leveraging a network position between the
client and the registry to block the StartTLS command, aka a “StartTLS
stripping attack.”

References:
https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/
https://www.ruby-lang.org/en/news/2021/07/07/starttls-stripping-in-net-imap/

Patches from:
bf4d05173c
e2ac25d0eb

(From OE-Core rev: e14761916290c01683d72eb8e3de530f944fdfab)

Signed-off-by: Yi Zhao <yi.zhao@windriver.com>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-09-17 21:31:37 +01:00
..
2021-07-20 19:05:45 +01:00
2021-02-17 11:01:17 +00:00
2021-02-19 11:17:10 +00:00
2021-05-15 17:18:21 +01:00
2021-01-20 22:46:18 +00:00
2021-03-10 10:30:39 +00:00
2021-03-20 18:54:56 +00:00
2021-06-03 16:31:02 +01:00
2021-03-31 00:06:23 +01:00
2021-08-26 08:32:13 +01:00
2020-07-27 19:58:09 +01:00
2021-03-10 10:30:39 +00:00
2021-03-01 11:12:16 +00:00
2019-05-27 17:06:34 +01:00
2020-03-08 08:21:11 +00:00
2019-02-15 16:05:37 +00:00
2020-12-31 11:53:26 +00:00
2021-01-01 23:15:13 +00:00
2021-05-11 12:02:29 +01:00
2021-07-20 19:05:45 +01:00
2020-06-09 13:13:59 +01:00
2021-06-03 16:31:02 +01:00
2021-08-06 09:59:14 +01:00
2021-08-18 18:00:24 +01:00
2021-04-30 14:37:26 +01:00
2021-05-04 22:57:51 +01:00
2021-03-20 18:54:56 +00:00
2021-03-01 11:12:16 +00:00
2021-03-06 22:39:04 +00:00