vulnerability
CentOS Linux: CVE-2019-8323: Important: ruby security update (CESA-2019:1235)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Mar 5, 2019 | May 23, 2019 | May 25, 2023 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Mar 5, 2019
Added
May 23, 2019
Modified
May 25, 2023
Description
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
Solution(s)
centos-upgrade-rubycentos-upgrade-ruby-debuginfocentos-upgrade-ruby-develcentos-upgrade-ruby-doccentos-upgrade-ruby-irbcentos-upgrade-ruby-libscentos-upgrade-ruby-tcltkcentos-upgrade-rubygem-bigdecimalcentos-upgrade-rubygem-io-consolecentos-upgrade-rubygem-jsoncentos-upgrade-rubygem-minitestcentos-upgrade-rubygem-psychcentos-upgrade-rubygem-rakecentos-upgrade-rubygem-rdoccentos-upgrade-rubygemscentos-upgrade-rubygems-devel
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.