Vulnerabilities > CVE-2019-8324 - Code Injection vulnerability in multiple products

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL

Summary

An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Leverage Executable Code in Non-Executable Files
    An attack of this type exploits a system's trust in configuration and resource files, when the executable loads the resource (such as an image file or configuration file) the attacker has modified the file to either execute malicious code directly or manipulate the target process (e.g. application server) to execute based on the malicious configuration parameters. Since systems are increasingly interrelated mashing up resources from local and remote sources the possibility of this attack occurring is high. The attack can be directed at a client system, such as causing buffer overrun through loading seemingly benign image files, as in Microsoft Security Bulletin MS04-028 where specially crafted JPEG files could cause a buffer overrun once loaded into the browser. Another example targets clients reading pdf files. In this case the attacker simply appends javascript to the end of a legitimate url for a pdf (http://www.gnucitizen.org/blog/danger-danger-danger/) http://path/to/pdf/file.pdf#whatever_name_you_want=javascript:your_code_here The client assumes that they are reading a pdf, but the attacker has modified the resource and loaded executable javascript into the client's browser process. The attack can also target server processes. The attacker edits the resource or configuration file, for example a web.xml file used to configure security permissions for a J2EE app server, adding role name "public" grants all users with the public role the ability to use the administration functionality. The server trusts its configuration file to be correct, but when they are manipulated, the attacker gains full control.
  • Manipulating User-Controlled Variables
    This attack targets user controlled variables (DEBUG=1, PHP Globals, and So Forth). An attacker can override environment variables leveraging user-supplied, untrusted query variables directly used on the application server without any data sanitization. In extreme cases, the attacker can change variables controlling the business logic of the application. For instance, in languages like PHP, a number of poorly set default configurations may allow the user to override variables.

Nessus

  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1972.NASL
    descriptionAn update for the ruby:2.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es) : * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-05-23
    modified2019-08-12
    plugin id127642
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127642
    titleRHEL 8 : ruby:2.5 (RHSA-2019:1972)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2019-1235.NASL
    descriptionAn update for ruby is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es) : * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) * rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322) * rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323) * rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id125201
    published2019-05-16
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125201
    titleRHEL 7 : ruby (RHSA-2019:1235)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-FEAC6674B7.NASL
    descriptionRebase to latest minor version fixes CVE-2019-8320 CVE-2019-8321 CVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id124728
    published2019-05-10
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124728
    titleFedora 28 : ruby (2019-feac6674b7)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1617.NASL
    descriptionAccording to the versions of the ruby packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities : - An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.(CVE-2018-16395) - An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.(CVE-2018-16396) - ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2019-8322) - ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2019-8323) - ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2019-8324) - ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2019-8325) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id125569
    published2019-05-30
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125569
    titleEulerOS Virtualization for ARM 64 3.0.2.0 : ruby (EulerOS-SA-2019-1617)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2019-A155364F3C.NASL
    descriptionRebase to latest minor version fixes CVE-2019-8320 CVE-2019-8321 CVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id124574
    published2019-05-03
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124574
    titleFedora 29 : ruby (2019-a155364f3c)
  • NASL familyAmazon Linux Local Security Checks
    NASL idALA_ALAS-2019-1255.NASL
    descriptionAn issue was discovered in RubyGems. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.(CVE-2019-8322) An issue was discovered in RubyGems. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.(CVE-2019-8323) An issue was discovered in RubyGems. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.(CVE-2019-8321) A Directory Traversal issue was discovered in RubyGems. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user
    last seen2020-06-01
    modified2020-06-02
    plugin id127811
    published2019-08-13
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127811
    titleAmazon Linux AMI : ruby20 / ruby21,ruby24 (ALAS-2019-1255)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_SU-2019-1804-1.NASL
    descriptionThis update for ruby2.5 and ruby-bundled-gems-rpmhelper fixes the following issues : Changes in ruby2.5 : Update to 2.5.5 and 2.5.4 : https://www.ruby-lang.org/en/news/2019/03/15/ruby-2-5-5-released/ https://www.ruby-lang.org/en/news/2019/03/13/ruby-2-5-4-released/ Security issues fixed : CVE-2019-8320: Delete directory using symlink when decompressing tar (bsc#1130627) CVE-2019-8321: Escape sequence injection vulnerability in verbose (bsc#1130623) CVE-2019-8322: Escape sequence injection vulnerability in gem owner (bsc#1130622) CVE-2019-8323: Escape sequence injection vulnerability in API response handling (bsc#1130620) CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution (bsc#1130617) CVE-2019-8325: Escape sequence injection vulnerability in errors (bsc#1130611) Ruby 2.5 was updated to 2.5.3 : This release includes some bug fixes and some security fixes. Security issues fixed: CVE-2018-16396: Tainted flags are not propagated in Array#pack and String#unpack with some directives (bsc#1112532) CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly (bsc#1112530) Ruby 2.5 was updated to 2.5.1 : This release includes some bug fixes and some security fixes. Security issues fixed: CVE-2017-17742: HTTP response splitting in WEBrick (bsc#1087434) CVE-2018-6914: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441) CVE-2018-8777: DoS by large request in WEBrick (bsc#1087436) CVE-2018-8778: Buffer under-read in String#unpack (bsc#1087433) CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440) CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437) Multiple vulnerabilities in RubyGems were fixed : - CVE-2018-1000079: Fixed path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058) - CVE-2018-1000075: Fixed infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014) - CVE-2018-1000078: Fixed XSS vulnerability in homepage attribute when displayed via gem server (bsc#1082011) - CVE-2018-1000077: Fixed that missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (bsc#1082010) - CVE-2018-1000076: Fixed improper verification of signatures in tarball allows to install mis-signed gem (bsc#1082009) - CVE-2018-1000074: Fixed unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (bsc#1082008) - CVE-2018-1000073: Fixed path traversal when writing to a symlinked basedir outside of the root (bsc#1082007) Other changes: Fixed Net::POPMail methods modify frozen literal when using default arg ruby: change over of the Japanese Era to the new emperor May 1st 2019 (bsc#1133790) build with PIE support (bsc#1130028) Changes in ruby-bundled-gems-rpmhelper: Add a new helper for bundled ruby gems. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id126617
    published2019-07-11
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126617
    titleSUSE SLED15 / SLES15 Security Update : ruby-bundled-gems-rpmhelper, ruby2.5 (SUSE-SU-2019:1804-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4433.NASL
    descriptionSeveral vulnerabilities have been discovered in the Rubygems included in the interpreter for the Ruby language, which may result in denial of service or the execution of arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id124096
    published2019-04-17
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/124096
    titleDebian DSA-4433-1 : ruby2.3 - security update
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0080_RUBY.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has ruby packages installed that are affected by multiple vulnerabilities: - An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. (CVE-2019-8322) - An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. (CVE-2019-8323) - An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. (CVE-2019-8324) - An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) (CVE-2019-8325) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127292
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127292
    titleNewStart CGSL CORE 5.04 / MAIN 5.04 : ruby Multiple Vulnerabilities (NS-SA-2019-0080)
  • NASL familyAmazon Linux Local Security Checks
    NASL idAL2_ALAS-2019-1249.NASL
    descriptionAn issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. (CVE-2019-8322) An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. (CVE-2019-8323) An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) (CVE-2019-8325) An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. (CVE-2019-8324)
    last seen2020-06-01
    modified2020-06-02
    plugin id126961
    published2019-07-24
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126961
    titleAmazon Linux 2 : ruby (ALAS-2019-1249)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1597.NASL
    descriptionAccording to the versions of the ruby packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) - rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322) - rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323) - rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2019-05-29
    plugin id125524
    published2019-05-29
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125524
    titleEulerOS 2.0 SP5 : ruby (EulerOS-SA-2019-1597)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2019-1235.NASL
    descriptionAn update for ruby is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es) : * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) * rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322) * rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323) * rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id125316
    published2019-05-22
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125316
    titleCentOS 7 : ruby (CESA-2019:1235)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2019-1972.NASL
    descriptionFrom Red Hat Security Advisory 2019:1972 : An update for the ruby:2.5 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es) : * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id127610
    published2019-08-12
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127610
    titleOracle Linux 8 : ruby:2.5 (ELSA-2019-1972)
  • NASL familyHuawei Local Security Checks
    NASL idEULEROS_SA-2019-1718.NASL
    descriptionAccording to the versions of the ruby packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) - rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322) - rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323) - rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-05-06
    modified2019-07-22
    plugin id126846
    published2019-07-22
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126846
    titleEulerOS 2.0 SP2 : ruby (EulerOS-SA-2019-1718)
  • NASL familyNewStart CGSL Local Security Checks
    NASL idNEWSTART_CGSL_NS-SA-2019-0084_RUBY.NASL
    descriptionThe remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has ruby packages installed that are affected by multiple vulnerabilities: - An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. (CVE-2019-8322) - An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. (CVE-2019-8323) - An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. (CVE-2019-8324) - An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) (CVE-2019-8325) Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id127299
    published2019-08-12
    reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/127299
    titleNewStart CGSL CORE 5.05 / MAIN 5.05 : ruby Multiple Vulnerabilities (NS-SA-2019-0084)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1735.NASL
    descriptionSeveral vulnerabilities have been discovered in rubygems embedded in ruby2.1, the interpreted scripting language. CVE-2019-8320 A Directory Traversal issue was discovered in RubyGems. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. CVE-2019-8322 The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. CVE-2019-8323 Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. CVE-2019-8324 A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. CVE-2019-8325 An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id123522
    published2019-04-01
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/123522
    titleDebian DLA-1735-1 : ruby2.1 security update
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_27B12D04472211E98B7CB5E01141761F.NASL
    descriptionRubyGems Security Advisories : CVE-2019-8320: Delete directory using symlink when decompressing tar CVE-2019-8321: Escape sequence injection vulnerability in
    last seen2020-06-01
    modified2020-06-02
    plugin id122883
    published2019-03-18
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/122883
    titleFreeBSD : RubyGems -- multiple vulnerabilities (27b12d04-4722-11e9-8b7c-b5e01141761f)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2019-1235.NASL
    descriptionFrom Red Hat Security Advisory 2019:1235 : An update for ruby is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Security Fix(es) : * rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) * rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322) * rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323) * rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
    last seen2020-06-01
    modified2020-06-02
    plugin id125191
    published2019-05-16
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125191
    titleOracle Linux 7 : ruby (ELSA-2019-1235)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DLA-1796.NASL
    descriptionMultiple vulnerabilities have been discovered in jruby, Java implementation of the Ruby programming language. CVE-2018-1000074 Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file CVE-2018-1000075 an infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop CVE-2018-1000076 Improper Verification of Cryptographic Signature vulnerability in package.rb that can result in a mis-signed gem could be installed, as the tarball would contain multiple gem signatures. CVE-2018-1000077 Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem could set an invalid homepage URL CVE-2018-1000078 Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appear to be exploitable via the victim must browse to a malicious gem on a vulnerable gem server CVE-2019-8321 Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible CVE-2019-8322 The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur CVE-2019-8323 Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. CVE-2019-8324 A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec CVE-2019-8325 Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) For Debian 8
    last seen2020-06-01
    modified2020-06-02
    plugin id125297
    published2019-05-21
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125297
    titleDebian DLA-1796-1 : jruby security update
  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2019-1771.NASL
    descriptionThis update for ruby2.5 and ruby-bundled-gems-rpmhelper fixes the following issues : Changes in ruby2.5 : Update to 2.5.5 and 2.5.4 : https://www.ruby-lang.org/en/news/2019/03/15/ruby-2-5-5-released/ https://www.ruby-lang.org/en/news/2019/03/13/ruby-2-5-4-released/ Security issues fixed : - CVE-2019-8320: Delete directory using symlink when decompressing tar (bsc#1130627) - CVE-2019-8321: Escape sequence injection vulnerability in verbose (bsc#1130623) - CVE-2019-8322: Escape sequence injection vulnerability in gem owner (bsc#1130622) - CVE-2019-8323: Escape sequence injection vulnerability in API response handling (bsc#1130620) - CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution (bsc#1130617) - CVE-2019-8325: Escape sequence injection vulnerability in errors (bsc#1130611) Ruby 2.5 was updated to 2.5.3 : This release includes some bug fixes and some security fixes. Security issues fixed : - CVE-2018-16396: Tainted flags are not propagated in Array#pack and String#unpack with some directives (bsc#1112532) - CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly (bsc#1112530) Ruby 2.5 was updated to 2.5.1 : This release includes some bug fixes and some security fixes. Security issues fixed : - CVE-2017-17742: HTTP response splitting in WEBrick (bsc#1087434) - CVE-2018-6914: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441) - CVE-2018-8777: DoS by large request in WEBrick (bsc#1087436) - CVE-2018-8778: Buffer under-read in String#unpack (bsc#1087433) - CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440) - CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437) - Multiple vulnerabilities in RubyGems were fixed : - CVE-2018-1000079: Fixed path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058) - CVE-2018-1000075: Fixed infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014) - CVE-2018-1000078: Fixed XSS vulnerability in homepage attribute when displayed via gem server (bsc#1082011) - CVE-2018-1000077: Fixed that missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (bsc#1082010) - CVE-2018-1000076: Fixed improper verification of signatures in tarball allows to install mis-signed gem (bsc#1082009) - CVE-2018-1000074: Fixed unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (bsc#1082008) - CVE-2018-1000073: Fixed path traversal when writing to a symlinked basedir outside of the root (bsc#1082007) Other changes : - Fixed Net::POPMail methods modify frozen literal when using default arg - ruby: change over of the Japanese Era to the new emperor May 1st 2019 (bsc#1133790) - build with PIE support (bsc#1130028) Changes in ruby-bundled-gems-rpmhelper : - Add a new helper for bundled ruby gems. This update was imported from the SUSE:SLE-15:Update update project.
    last seen2020-06-01
    modified2020-06-02
    plugin id126904
    published2019-07-22
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/126904
    titleopenSUSE Security Update : ruby-bundled-gems-rpmhelper / ruby2.5 (openSUSE-2019-1771)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20190515_RUBY_ON_SL7_X.NASL
    descriptionSecurity Fix(es) : - rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) - rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322) - rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323) - rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)
    last seen2020-03-18
    modified2019-05-16
    plugin id125208
    published2019-05-16
    reporterThis script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/125208
    titleScientific Linux Security Update : ruby on SL7.x x86_64 (20190515)

Redhat

advisories
bugzilla
id1692520
titleCVE-2019-8324 rubygems: Installing a malicious gem may lead to arbitrary code execution
oval
OR
  • commentRed Hat Enterprise Linux must be installed
    ovaloval:com.redhat.rhba:tst:20070304026
  • AND
    • commentRed Hat Enterprise Linux 8 is installed
      ovaloval:com.redhat.rhba:tst:20193384074
    • commentModule ruby:2.5 is enabled
      ovaloval:com.redhat.rhba:tst:20193384073
    • OR
      • AND
        • commentrubygem-psych is earlier than 0:3.0.2-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972001
        • commentrubygem-psych is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384002
      • AND
        • commentrubygem-pg-debugsource is earlier than 0:1.0.0-2.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972003
        • commentrubygem-pg-debugsource is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384004
      • AND
        • commentrubygem-pg is earlier than 0:1.0.0-2.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972005
        • commentrubygem-pg is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384006
      • AND
        • commentrubygem-openssl is earlier than 0:2.1.2-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972007
        • commentrubygem-openssl is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384008
      • AND
        • commentrubygem-mysql2-debugsource is earlier than 0:0.4.10-4.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972009
        • commentrubygem-mysql2-debugsource is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384010
      • AND
        • commentrubygem-mysql2 is earlier than 0:0.4.10-4.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972011
        • commentrubygem-mysql2 is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384012
      • AND
        • commentrubygem-json is earlier than 0:2.1.0-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972013
        • commentrubygem-json is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384014
      • AND
        • commentrubygem-io-console is earlier than 0:0.4.6-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972015
        • commentrubygem-io-console is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384016
      • AND
        • commentrubygem-bson-debugsource is earlier than 0:4.3.0-2.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972017
        • commentrubygem-bson-debugsource is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384018
      • AND
        • commentrubygem-bson is earlier than 0:4.3.0-2.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972019
        • commentrubygem-bson is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384020
      • AND
        • commentrubygem-bigdecimal is earlier than 0:1.3.4-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972021
        • commentrubygem-bigdecimal is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384022
      • AND
        • commentruby-libs is earlier than 0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972023
        • commentruby-libs is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384024
      • AND
        • commentruby-devel is earlier than 0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972025
        • commentruby-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384026
      • AND
        • commentruby-debugsource is earlier than 0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972027
        • commentruby-debugsource is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384028
      • AND
        • commentruby is earlier than 0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972029
        • commentruby is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384030
      • AND
        • commentrubygems-devel is earlier than 0:2.7.6-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972031
        • commentrubygems-devel is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384032
      • AND
        • commentrubygems is earlier than 0:2.7.6-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972033
        • commentrubygems is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384034
      • AND
        • commentrubygem-xmlrpc is earlier than 0:0.3.0-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972035
        • commentrubygem-xmlrpc is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384036
      • AND
        • commentrubygem-test-unit is earlier than 0:3.2.7-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972037
        • commentrubygem-test-unit is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384038
      • AND
        • commentrubygem-rdoc is earlier than 0:6.0.1-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972039
        • commentrubygem-rdoc is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384040
      • AND
        • commentrubygem-rake is earlier than 0:12.3.0-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972041
        • commentrubygem-rake is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384042
      • AND
        • commentrubygem-power_assert is earlier than 0:1.1.1-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972043
        • commentrubygem-power_assert is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384044
      • AND
        • commentrubygem-pg-doc is earlier than 0:1.0.0-2.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972045
        • commentrubygem-pg-doc is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384046
      • AND
        • commentrubygem-net-telnet is earlier than 0:0.1.1-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972047
        • commentrubygem-net-telnet is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384048
      • AND
        • commentrubygem-mysql2-doc is earlier than 0:0.4.10-4.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972049
        • commentrubygem-mysql2-doc is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384050
      • AND
        • commentrubygem-mongo-doc is earlier than 0:2.5.1-2.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972051
        • commentrubygem-mongo-doc is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384052
      • AND
        • commentrubygem-mongo is earlier than 0:2.5.1-2.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972053
        • commentrubygem-mongo is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384054
      • AND
        • commentrubygem-minitest is earlier than 0:5.10.3-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972055
        • commentrubygem-minitest is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384056
      • AND
        • commentrubygem-did_you_mean is earlier than 0:1.2.0-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972057
        • commentrubygem-did_you_mean is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384058
      • AND
        • commentrubygem-bundler-doc is earlier than 0:1.16.1-3.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972059
        • commentrubygem-bundler-doc is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384060
      • AND
        • commentrubygem-bundler is earlier than 0:1.16.1-3.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972061
        • commentrubygem-bundler is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384062
      • AND
        • commentrubygem-bson-doc is earlier than 0:4.3.0-2.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972063
        • commentrubygem-bson-doc is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384064
      • AND
        • commentrubygem-abrt-doc is earlier than 0:0.3.0-4.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972065
        • commentrubygem-abrt-doc is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384066
      • AND
        • commentrubygem-abrt is earlier than 0:0.3.0-4.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972067
        • commentrubygem-abrt is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384068
      • AND
        • commentruby-irb is earlier than 0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972069
        • commentruby-irb is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384070
      • AND
        • commentruby-doc is earlier than 0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
          ovaloval:com.redhat.rhsa:tst:20191972071
        • commentruby-doc is signed with Red Hat redhatrelease2 key
          ovaloval:com.redhat.rhba:tst:20193384072
rhsa
idRHSA-2019:1972
released2019-08-07
severityImportant
titleRHSA-2019:1972: ruby:2.5 security update (Important)
rpms
  • rh-ruby25-ruby-0:2.5.5-7.el7
  • rh-ruby25-ruby-debuginfo-0:2.5.5-7.el7
  • rh-ruby25-ruby-devel-0:2.5.5-7.el7
  • rh-ruby25-ruby-doc-0:2.5.5-7.el7
  • rh-ruby25-ruby-irb-0:2.5.5-7.el7
  • rh-ruby25-ruby-libs-0:2.5.5-7.el7
  • rh-ruby25-rubygem-bigdecimal-0:1.3.4-7.el7
  • rh-ruby25-rubygem-did_you_mean-0:1.2.0-7.el7
  • rh-ruby25-rubygem-io-console-0:0.4.6-7.el7
  • rh-ruby25-rubygem-json-0:2.1.0-7.el7
  • rh-ruby25-rubygem-minitest-0:5.10.3-7.el7
  • rh-ruby25-rubygem-net-telnet-0:0.1.1-7.el7
  • rh-ruby25-rubygem-openssl-0:2.1.2-7.el7
  • rh-ruby25-rubygem-power_assert-0:1.1.1-7.el7
  • rh-ruby25-rubygem-psych-0:3.0.2-7.el7
  • rh-ruby25-rubygem-rake-0:12.3.0-7.el7
  • rh-ruby25-rubygem-rdoc-0:6.0.1-7.el7
  • rh-ruby25-rubygem-test-unit-0:3.2.7-7.el7
  • rh-ruby25-rubygem-xmlrpc-0:0.3.0-7.el7
  • rh-ruby25-rubygems-0:2.7.6.2-7.el7
  • rh-ruby25-rubygems-devel-0:2.7.6.2-7.el7
  • rh-ruby24-ruby-0:2.4.6-92.el6
  • rh-ruby24-ruby-0:2.4.6-92.el7
  • rh-ruby24-ruby-debuginfo-0:2.4.6-92.el6
  • rh-ruby24-ruby-debuginfo-0:2.4.6-92.el7
  • rh-ruby24-ruby-devel-0:2.4.6-92.el6
  • rh-ruby24-ruby-devel-0:2.4.6-92.el7
  • rh-ruby24-ruby-doc-0:2.4.6-92.el6
  • rh-ruby24-ruby-doc-0:2.4.6-92.el7
  • rh-ruby24-ruby-irb-0:2.4.6-92.el6
  • rh-ruby24-ruby-irb-0:2.4.6-92.el7
  • rh-ruby24-ruby-libs-0:2.4.6-92.el6
  • rh-ruby24-ruby-libs-0:2.4.6-92.el7
  • rh-ruby24-rubygem-bigdecimal-0:1.3.2-92.el6
  • rh-ruby24-rubygem-bigdecimal-0:1.3.2-92.el7
  • rh-ruby24-rubygem-did_you_mean-0:1.1.0-92.el6
  • rh-ruby24-rubygem-did_you_mean-0:1.1.0-92.el7
  • rh-ruby24-rubygem-io-console-0:0.4.6-92.el6
  • rh-ruby24-rubygem-io-console-0:0.4.6-92.el7
  • rh-ruby24-rubygem-json-0:2.0.4-92.el6
  • rh-ruby24-rubygem-json-0:2.0.4-92.el7
  • rh-ruby24-rubygem-minitest-0:5.10.1-92.el6
  • rh-ruby24-rubygem-minitest-0:5.10.1-92.el7
  • rh-ruby24-rubygem-net-telnet-0:0.1.1-92.el6
  • rh-ruby24-rubygem-net-telnet-0:0.1.1-92.el7
  • rh-ruby24-rubygem-openssl-0:2.0.9-92.el6
  • rh-ruby24-rubygem-openssl-0:2.0.9-92.el7
  • rh-ruby24-rubygem-power_assert-0:0.4.1-92.el6
  • rh-ruby24-rubygem-power_assert-0:0.4.1-92.el7
  • rh-ruby24-rubygem-psych-0:2.2.2-92.el6
  • rh-ruby24-rubygem-psych-0:2.2.2-92.el7
  • rh-ruby24-rubygem-rake-0:12.0.0-92.el6
  • rh-ruby24-rubygem-rake-0:12.0.0-92.el7
  • rh-ruby24-rubygem-rdoc-0:5.0.0-92.el6
  • rh-ruby24-rubygem-rdoc-0:5.0.0-92.el7
  • rh-ruby24-rubygem-test-unit-0:3.2.3-92.el6
  • rh-ruby24-rubygem-test-unit-0:3.2.3-92.el7
  • rh-ruby24-rubygem-xmlrpc-0:0.2.1-92.el6
  • rh-ruby24-rubygem-xmlrpc-0:0.2.1-92.el7
  • rh-ruby24-rubygems-0:2.6.14.4-92.el6
  • rh-ruby24-rubygems-0:2.6.14.4-92.el7
  • rh-ruby24-rubygems-devel-0:2.6.14.4-92.el6
  • rh-ruby24-rubygems-devel-0:2.6.14.4-92.el7
  • rh-ruby23-ruby-0:2.3.8-70.el6
  • rh-ruby23-ruby-0:2.3.8-70.el7
  • rh-ruby23-ruby-debuginfo-0:2.3.8-70.el6
  • rh-ruby23-ruby-debuginfo-0:2.3.8-70.el7
  • rh-ruby23-ruby-devel-0:2.3.8-70.el6
  • rh-ruby23-ruby-devel-0:2.3.8-70.el7
  • rh-ruby23-ruby-doc-0:2.3.8-70.el6
  • rh-ruby23-ruby-doc-0:2.3.8-70.el7
  • rh-ruby23-ruby-irb-0:2.3.8-70.el6
  • rh-ruby23-ruby-irb-0:2.3.8-70.el7
  • rh-ruby23-ruby-libs-0:2.3.8-70.el6
  • rh-ruby23-ruby-libs-0:2.3.8-70.el7
  • rh-ruby23-ruby-tcltk-0:2.3.8-70.el6
  • rh-ruby23-ruby-tcltk-0:2.3.8-70.el7
  • rh-ruby23-rubygem-bigdecimal-0:1.2.8-70.el6
  • rh-ruby23-rubygem-bigdecimal-0:1.2.8-70.el7
  • rh-ruby23-rubygem-did_you_mean-0:1.0.0-70.el6
  • rh-ruby23-rubygem-did_you_mean-0:1.0.0-70.el7
  • rh-ruby23-rubygem-io-console-0:0.4.5-70.el6
  • rh-ruby23-rubygem-io-console-0:0.4.5-70.el7
  • rh-ruby23-rubygem-json-0:1.8.3.1-70.el6
  • rh-ruby23-rubygem-json-0:1.8.3.1-70.el7
  • rh-ruby23-rubygem-minitest-0:5.8.5-70.el6
  • rh-ruby23-rubygem-minitest-0:5.8.5-70.el7
  • rh-ruby23-rubygem-net-telnet-0:0.1.1-70.el6
  • rh-ruby23-rubygem-net-telnet-0:0.1.1-70.el7
  • rh-ruby23-rubygem-power_assert-0:0.2.6-70.el6
  • rh-ruby23-rubygem-power_assert-0:0.2.6-70.el7
  • rh-ruby23-rubygem-psych-0:2.1.0.1-70.el6
  • rh-ruby23-rubygem-psych-0:2.1.0.1-70.el7
  • rh-ruby23-rubygem-rake-0:10.4.2-70.el6
  • rh-ruby23-rubygem-rake-0:10.4.2-70.el7
  • rh-ruby23-rubygem-rdoc-0:4.2.1-70.el6
  • rh-ruby23-rubygem-rdoc-0:4.2.1-70.el7
  • rh-ruby23-rubygem-test-unit-0:3.1.5-70.el6
  • rh-ruby23-rubygem-test-unit-0:3.1.5-70.el7
  • rh-ruby23-rubygems-0:2.5.2.3-70.el6
  • rh-ruby23-rubygems-0:2.5.2.3-70.el7
  • rh-ruby23-rubygems-devel-0:2.5.2.3-70.el6
  • rh-ruby23-rubygems-devel-0:2.5.2.3-70.el7
  • ruby-0:2.0.0.648-35.el7_6
  • ruby-debuginfo-0:2.0.0.648-35.el7_6
  • ruby-devel-0:2.0.0.648-35.el7_6
  • ruby-doc-0:2.0.0.648-35.el7_6
  • ruby-irb-0:2.0.0.648-35.el7_6
  • ruby-libs-0:2.0.0.648-35.el7_6
  • ruby-tcltk-0:2.0.0.648-35.el7_6
  • rubygem-bigdecimal-0:1.2.0-35.el7_6
  • rubygem-io-console-0:0.4.2-35.el7_6
  • rubygem-json-0:1.7.7-35.el7_6
  • rubygem-minitest-0:4.3.2-35.el7_6
  • rubygem-psych-0:2.0.0-35.el7_6
  • rubygem-rake-0:0.9.6-35.el7_6
  • rubygem-rdoc-0:4.0.0-35.el7_6
  • rubygems-0:2.0.14.1-35.el7_6
  • rubygems-devel-0:2.0.14.1-35.el7_6
  • cfme-0:5.10.5.1-1.el7cf
  • cfme-amazon-smartstate-0:5.10.5.1-1.el7cf
  • cfme-appliance-0:5.10.5.1-1.el7cf
  • cfme-appliance-common-0:5.10.5.1-1.el7cf
  • cfme-appliance-debuginfo-0:5.10.5.1-1.el7cf
  • cfme-appliance-tools-0:5.10.5.1-1.el7cf
  • cfme-debuginfo-0:5.10.5.1-1.el7cf
  • cfme-gemset-0:5.10.5.1-1.el7cf
  • cfme-gemset-debuginfo-0:5.10.5.1-1.el7cf
  • ruby-0:2.4.6-91.el7cf
  • ruby-debuginfo-0:2.4.6-91.el7cf
  • ruby-devel-0:2.4.6-91.el7cf
  • ruby-doc-0:2.4.6-91.el7cf
  • ruby-irb-0:2.4.6-91.el7cf
  • ruby-libs-0:2.4.6-91.el7cf
  • rubygem-bigdecimal-0:1.3.2-91.el7cf
  • rubygem-did_you_mean-0:1.1.0-91.el7cf
  • rubygem-io-console-0:0.4.6-91.el7cf
  • rubygem-minitest-0:5.10.1-91.el7cf
  • rubygem-net-telnet-0:0.1.1-91.el7cf
  • rubygem-openssl-0:2.0.9-91.el7cf
  • rubygem-power_assert-0:0.4.1-91.el7cf
  • rubygem-psych-0:2.2.2-91.el7cf
  • rubygem-rake-0:12.0.0-91.el7cf
  • rubygem-rdoc-0:5.0.0-91.el7cf
  • rubygem-test-unit-0:3.2.3-91.el7cf
  • rubygem-xmlrpc-0:0.2.1-91.el7cf
  • rubygems-0:2.6.14.4-91.el7cf
  • rubygems-devel-0:2.6.14.4-91.el7cf
  • ruby-0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
  • ruby-debuginfo-0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
  • ruby-debugsource-0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
  • ruby-devel-0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
  • ruby-doc-0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
  • ruby-irb-0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
  • ruby-libs-0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
  • ruby-libs-debuginfo-0:2.5.3-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-abrt-0:0.3.0-4.module+el8.0.0+3250+4b7d6d43
  • rubygem-abrt-doc-0:0.3.0-4.module+el8.0.0+3250+4b7d6d43
  • rubygem-bigdecimal-0:1.3.4-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-bigdecimal-debuginfo-0:1.3.4-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-bson-0:4.3.0-2.module+el8.0.0+3250+4b7d6d43
  • rubygem-bson-debuginfo-0:4.3.0-2.module+el8.0.0+3250+4b7d6d43
  • rubygem-bson-debugsource-0:4.3.0-2.module+el8.0.0+3250+4b7d6d43
  • rubygem-bson-doc-0:4.3.0-2.module+el8.0.0+3250+4b7d6d43
  • rubygem-bundler-0:1.16.1-3.module+el8.0.0+3250+4b7d6d43
  • rubygem-bundler-doc-0:1.16.1-3.module+el8.0.0+3250+4b7d6d43
  • rubygem-did_you_mean-0:1.2.0-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-io-console-0:0.4.6-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-io-console-debuginfo-0:0.4.6-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-json-0:2.1.0-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-json-debuginfo-0:2.1.0-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-minitest-0:5.10.3-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-mongo-0:2.5.1-2.module+el8.0.0+3250+4b7d6d43
  • rubygem-mongo-doc-0:2.5.1-2.module+el8.0.0+3250+4b7d6d43
  • rubygem-mysql2-0:0.4.10-4.module+el8.0.0+3250+4b7d6d43
  • rubygem-mysql2-debuginfo-0:0.4.10-4.module+el8.0.0+3250+4b7d6d43
  • rubygem-mysql2-debugsource-0:0.4.10-4.module+el8.0.0+3250+4b7d6d43
  • rubygem-mysql2-doc-0:0.4.10-4.module+el8.0.0+3250+4b7d6d43
  • rubygem-net-telnet-0:0.1.1-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-openssl-0:2.1.2-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-openssl-debuginfo-0:2.1.2-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-pg-0:1.0.0-2.module+el8.0.0+3250+4b7d6d43
  • rubygem-pg-debuginfo-0:1.0.0-2.module+el8.0.0+3250+4b7d6d43
  • rubygem-pg-debugsource-0:1.0.0-2.module+el8.0.0+3250+4b7d6d43
  • rubygem-pg-doc-0:1.0.0-2.module+el8.0.0+3250+4b7d6d43
  • rubygem-power_assert-0:1.1.1-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-psych-0:3.0.2-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-psych-debuginfo-0:3.0.2-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-rake-0:12.3.0-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-rdoc-0:6.0.1-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-test-unit-0:3.2.7-104.module+el8.0.0+3250+4b7d6d43
  • rubygem-xmlrpc-0:0.3.0-104.module+el8.0.0+3250+4b7d6d43
  • rubygems-0:2.7.6-104.module+el8.0.0+3250+4b7d6d43
  • rubygems-devel-0:2.7.6-104.module+el8.0.0+3250+4b7d6d43