vulnerability
Oracle Linux: CVE-2019-3881: ELSA-2021-2588: ruby:2.6 security, bug fix, and enhancement update (MODERATE)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:M/Au:N/C:P/I:P/A:P) | May 23, 2018 | Jul 8, 2021 | Dec 3, 2025 |
Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
May 23, 2018
Added
Jul 8, 2021
Modified
Dec 3, 2025
Description
Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.
Solutions
oracle-linux-upgrade-rubyoracle-linux-upgrade-ruby-develoracle-linux-upgrade-ruby-docoracle-linux-upgrade-rubygem-abrtoracle-linux-upgrade-rubygem-abrt-docoracle-linux-upgrade-rubygem-bigdecimaloracle-linux-upgrade-rubygem-bsonoracle-linux-upgrade-rubygem-bson-docoracle-linux-upgrade-rubygem-bundleroracle-linux-upgrade-rubygem-did-you-meanoracle-linux-upgrade-rubygem-io-consoleoracle-linux-upgrade-rubygem-irboracle-linux-upgrade-rubygem-jsonoracle-linux-upgrade-rubygem-minitestoracle-linux-upgrade-rubygem-mongooracle-linux-upgrade-rubygem-mongo-docoracle-linux-upgrade-rubygem-mysql2oracle-linux-upgrade-rubygem-mysql2-docoracle-linux-upgrade-rubygem-net-telnetoracle-linux-upgrade-rubygem-openssloracle-linux-upgrade-rubygem-pgoracle-linux-upgrade-rubygem-pg-docoracle-linux-upgrade-rubygem-power-assertoracle-linux-upgrade-rubygem-psychoracle-linux-upgrade-rubygem-rakeoracle-linux-upgrade-rubygem-rdocoracle-linux-upgrade-rubygemsoracle-linux-upgrade-rubygems-develoracle-linux-upgrade-rubygem-test-unitoracle-linux-upgrade-rubygem-xmlrpcoracle-linux-upgrade-ruby-libs
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.