First published: Tue Mar 05 2019(Updated: )
A flaw was found in RubyGems. A crafted gem with a multi-line name is not handled correctly allowing an attacker to inject arbitrary code to the stub line of gemspec. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rubygems-update | >=3.0.0<3.0.2 | 3.0.2 |
rubygems/rubygems-update | >=2.6.0<2.7.9 | 2.7.9 |
redhat/cfme | <0:5.10.5.1-1.el7cf | 0:5.10.5.1-1.el7cf |
redhat/cfme-amazon-smartstate | <0:5.10.5.1-1.el7cf | 0:5.10.5.1-1.el7cf |
redhat/cfme-appliance | <0:5.10.5.1-1.el7cf | 0:5.10.5.1-1.el7cf |
redhat/cfme-gemset | <0:5.10.5.1-1.el7cf | 0:5.10.5.1-1.el7cf |
redhat/ruby | <0:2.4.6-91.el7cf | 0:2.4.6-91.el7cf |
redhat/ruby | <0:2.0.0.648-35.el7_6 | 0:2.0.0.648-35.el7_6 |
redhat/ruby | <0:2.0.0.648-37.el7_4 | 0:2.0.0.648-37.el7_4 |
redhat/rh-ruby24-ruby | <0:2.4.6-92.el6 | 0:2.4.6-92.el6 |
redhat/rh-ruby23-ruby | <0:2.3.8-70.el6 | 0:2.3.8-70.el6 |
redhat/rh-ruby25-ruby | <0:2.5.5-7.el7 | 0:2.5.5-7.el7 |
redhat/rh-ruby24-ruby | <0:2.4.6-92.el7 | 0:2.4.6-92.el7 |
redhat/rh-ruby23-ruby | <0:2.3.8-70.el7 | 0:2.3.8-70.el7 |
Rubygems Rubygems | >=2.6.0<=3.0.2 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Redhat Enterprise Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-8324 is a vulnerability in RubyGems that allows an attacker to inject arbitrary code.
CVE-2019-8324 impacts RubyGems by allowing an attacker to inject arbitrary code into a gem with a multi-line name.
CVE-2019-8324 has a severity rating of 8.8, which is considered high.
RubyGems versions 2.6 and later through 3.0.2 are affected by CVE-2019-8324.
You can find more information about CVE-2019-8324 at the following references: [link1] [link2] [link3].