vulnerability

CentOS Linux: CVE-2019-8324: Important: ruby security update (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Mar 5, 2019
Added
May 23, 2019
Modified
May 25, 2023

Description

An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.

Solutions

centos-upgrade-rubycentos-upgrade-ruby-debuginfocentos-upgrade-ruby-debugsourcecentos-upgrade-ruby-develcentos-upgrade-ruby-doccentos-upgrade-ruby-irbcentos-upgrade-ruby-libscentos-upgrade-ruby-libs-debuginfocentos-upgrade-ruby-tcltkcentos-upgrade-rubygem-abrtcentos-upgrade-rubygem-abrt-doccentos-upgrade-rubygem-bigdecimalcentos-upgrade-rubygem-bigdecimal-debuginfocentos-upgrade-rubygem-bsoncentos-upgrade-rubygem-bson-debuginfocentos-upgrade-rubygem-bson-debugsourcecentos-upgrade-rubygem-bson-doccentos-upgrade-rubygem-bundlercentos-upgrade-rubygem-bundler-doccentos-upgrade-rubygem-did_you_meancentos-upgrade-rubygem-io-consolecentos-upgrade-rubygem-io-console-debuginfocentos-upgrade-rubygem-jsoncentos-upgrade-rubygem-json-debuginfocentos-upgrade-rubygem-minitestcentos-upgrade-rubygem-mongocentos-upgrade-rubygem-mongo-doccentos-upgrade-rubygem-mysql2centos-upgrade-rubygem-mysql2-debuginfocentos-upgrade-rubygem-mysql2-debugsourcecentos-upgrade-rubygem-mysql2-doccentos-upgrade-rubygem-net-telnetcentos-upgrade-rubygem-opensslcentos-upgrade-rubygem-openssl-debuginfocentos-upgrade-rubygem-pgcentos-upgrade-rubygem-pg-debuginfocentos-upgrade-rubygem-pg-debugsourcecentos-upgrade-rubygem-pg-doccentos-upgrade-rubygem-power_assertcentos-upgrade-rubygem-psychcentos-upgrade-rubygem-psych-debuginfocentos-upgrade-rubygem-rakecentos-upgrade-rubygem-rdoccentos-upgrade-rubygem-test-unitcentos-upgrade-rubygem-xmlrpccentos-upgrade-rubygemscentos-upgrade-rubygems-devel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.