Search for packages
| purl | pkg:deb/debian/rubygems@3.2.0~rc.1-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-8d7n-bfhu-dkfd | Loop with Unreachable Exit Condition (Infinite Loop) RubyGems contains an infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop. |
CVE-2018-1000075
GHSA-74pv-v9gh-h25p |
| VCID-8hm4-c4w4-gfen | Cross-site Scripting RubyGems contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appears to be exploitable by the victim browsing to a malicious gem on a vulnerable gem server. |
CVE-2018-1000078
GHSA-87qx-g5wg-mwmj |
| VCID-9t45-d5mf-3uar | Path Traversal RubyGems contains a Directory Traversal vulnerability in gem installation that can result in the gem being able to write to arbitrary filesystem locations during installation. This attack appears to be exploitable by a victim installing a malicious gem. |
CVE-2018-1000079
GHSA-8qxg-mff5-j3wc |
| VCID-af1f-xwwy-jfa8 | RubyGems contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appears to be exploitable when the victim runs the `gem owner` command on a gem with a specially crafted YAML file. |
CVE-2018-1000074
GHSA-qj2w-mw2r-pv39 |
| VCID-b36p-re17-n7dq | Improper Input Validation RubyGems is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command. |
CVE-2017-0900
GHSA-p7f2-rr42-m9xm |
| VCID-cde2-rv4n-tkau | Deserialization of Untrusted Data rubygems-update is vulnerable to a remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution. |
CVE-2017-0903
GHSA-mqwr-4qf2-2hcv |
| VCID-f7x5-hz5f-hyd3 | Improper Restriction of Operations within the Bounds of a Memory Buffer An issue was discovered in RubyGems. Since `Gem::CommandManager#run` calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) |
CVE-2019-8325
GHSA-4wm8-fjv7-j774 |
| VCID-ha3g-uyse-wybx | Injection Vulnerability An issue was discovered in RubyGems. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. |
CVE-2019-8322
GHSA-mh37-8c3g-3fgc |
| VCID-jkwe-c323-3yez | Argument Injection or Modification An issue was discovered in RubyGems. Since `Gem::UserInteraction#verbose` calls say without escaping, escape sequence injection is possible. |
CVE-2019-8321
GHSA-fr32-gr5c-xq5c |
| VCID-jmzh-89dm-r7g2 | Origin Validation Error RubyGems is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls. |
CVE-2017-0902
GHSA-73w7-6w9g-gc8w |
| VCID-k2ga-fgvp-5qc7 | Cryptographic Issues Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. |
CVE-2013-4287
GHSA-9j7m-rjqx-48vh OSV-97163 |
| VCID-ky5r-bch5-m7dv | Injection Vulnerability An issue was discovered in RubyGems. `Gem::GemcutterUtilities#with_response` may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. |
CVE-2019-8323
GHSA-3h4r-pjv6-cph9 |
| VCID-mamm-cvdr-subf | RubyGems contains an Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem being able to set an invalid homepage URL. |
CVE-2018-1000077
GHSA-gv86-43rv-79m2 |
| VCID-t78a-dw4s-vqf5 | Path Traversal A Directory Traversal issue was discovered in RubyGems. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (`/tmp`, `/usr`, etc.), this could likely lead to data loss or an unusable system. |
CVE-2019-8320
GHSA-5x32-c9mf-49cc |
| VCID-tq93-h2ag-s3bx | Path Traversal RubyGems contains a Directory Traversal vulnerability in install_location function of `package.rb` that can result in path traversal when writing to a symlinked basedir outside the root. |
CVE-2018-1000073
GHSA-gx69-6cp4-hxrj |
| VCID-ucdh-7fgy-33h8 | Cryptographic Issues Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. |
CVE-2013-4363
GHSA-9qvm-2vhf-q649 |
| VCID-w4ns-f42m-pyec | RubyGems contains an Improper Verification of Cryptographic Signature vulnerability in `package.rb` that can result in a mis-signed gem being installed, as the tarball would contain multiple gem signatures. |
CVE-2018-1000076
GHSA-mc6j-h948-v2p6 |
| VCID-xgmc-a5rk-zqag | Improper Input Validation A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is evaluated by `ensure_loadable_spec` during the pre-installation check. |
CVE-2019-8324
GHSA-76wm-422q-92mq |
| VCID-xgsa-5umz-qffr | Code Injection RubyGems is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences. |
CVE-2017-0899
GHSA-7gcp-2gmq-w3xh |
| VCID-xz68-vwz2-2ke4 | Improper Input Validation RubyGems fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem. |
CVE-2017-0901
GHSA-pm9x-4392-2c2p |