vulnerability

CentOS Linux: CVE-2019-3881: Moderate: ruby:2.6 security, bug fix, and enhancement update (CESA-2021:2588)

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Sep 4, 2020
Added
Jun 30, 2021
Modified
Jan 28, 2025

Description

Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.

Solutions

centos-upgrade-rubycentos-upgrade-ruby-debuginfocentos-upgrade-ruby-debugsourcecentos-upgrade-ruby-develcentos-upgrade-ruby-doccentos-upgrade-ruby-libscentos-upgrade-ruby-libs-debuginfocentos-upgrade-rubygem-abrtcentos-upgrade-rubygem-abrt-doccentos-upgrade-rubygem-bigdecimalcentos-upgrade-rubygem-bigdecimal-debuginfocentos-upgrade-rubygem-bsoncentos-upgrade-rubygem-bson-debuginfocentos-upgrade-rubygem-bson-debugsourcecentos-upgrade-rubygem-bson-doccentos-upgrade-rubygem-bundlercentos-upgrade-rubygem-did_you_meancentos-upgrade-rubygem-io-consolecentos-upgrade-rubygem-io-console-debuginfocentos-upgrade-rubygem-irbcentos-upgrade-rubygem-jsoncentos-upgrade-rubygem-json-debuginfocentos-upgrade-rubygem-minitestcentos-upgrade-rubygem-mongocentos-upgrade-rubygem-mongo-doccentos-upgrade-rubygem-mysql2centos-upgrade-rubygem-mysql2-debuginfocentos-upgrade-rubygem-mysql2-debugsourcecentos-upgrade-rubygem-mysql2-doccentos-upgrade-rubygem-net-telnetcentos-upgrade-rubygem-opensslcentos-upgrade-rubygem-openssl-debuginfocentos-upgrade-rubygem-pgcentos-upgrade-rubygem-pg-debuginfocentos-upgrade-rubygem-pg-debugsourcecentos-upgrade-rubygem-pg-doccentos-upgrade-rubygem-power_assertcentos-upgrade-rubygem-psychcentos-upgrade-rubygem-psych-debuginfocentos-upgrade-rubygem-rakecentos-upgrade-rubygem-rdoccentos-upgrade-rubygem-test-unitcentos-upgrade-rubygem-xmlrpccentos-upgrade-rubygemscentos-upgrade-rubygems-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.