First published: Thu Apr 19 2012(Updated: )
RubyGems before 1.8.23 does not verify an SSL certificate, which allows remote attackers to modify a gem during installation via a man-in-the-middle attack.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rubygems-update | <1.8.23 | 1.8.23 |
redhat/rubygems | <0:1.3.7-4.el6_4 | 0:1.3.7-4.el6_4 |
redhat/cumin | <0:0.1.5787-4.el6 | 0:0.1.5787-4.el6 |
redhat/rubygems | <0:1.8.23.2-1.el6 | 0:1.8.23.2-1.el6 |
redhat/rubygems | <0:1.8.24-4.el6 | 0:1.8.24-4.el6 |
Rubygems Rubygems | <=1.8.22 | |
Rubygems Rubygems | =1.8.0 | |
Rubygems Rubygems | =1.8.1 | |
Rubygems Rubygems | =1.8.2 | |
Rubygems Rubygems | =1.8.3 | |
Rubygems Rubygems | =1.8.4 | |
Rubygems Rubygems | =1.8.5 | |
Rubygems Rubygems | =1.8.6 | |
Rubygems Rubygems | =1.8.7 | |
Rubygems Rubygems | =1.8.8 | |
Rubygems Rubygems | =1.8.9 | |
Rubygems Rubygems | =1.8.10 | |
Rubygems Rubygems | =1.8.11 | |
Rubygems Rubygems | =1.8.12 | |
Rubygems Rubygems | =1.8.13 | |
Rubygems Rubygems | =1.8.14 | |
Rubygems Rubygems | =1.8.15 | |
Rubygems Rubygems | =1.8.16 | |
Rubygems Rubygems | =1.8.17 | |
Rubygems Rubygems | =1.8.18 | |
Rubygems Rubygems | =1.8.19 | |
Rubygems Rubygems | =1.8.20 | |
Rubygems Rubygems | =1.8.21 | |
Redhat Openshift | =1.2.2 | |
Canonical Ubuntu Linux | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)