Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-0188 (GCVE-0-2011-0188)
Vulnerability from cvelistv5 – Published: 2011-03-23 01:00 – Updated: 2024-08-06 21:43- n/a
| URL | Tags |
|---|---|
| http://www.redhat.com/support/errata/RHSA-2011-09… | vendor-advisoryx_refsource_REDHAT |
| http://www.securitytracker.com/id?1025236 | vdb-entryx_refsource_SECTRACK |
| http://www.mandriva.com/security/advisories?name=… | vendor-advisoryx_refsource_MANDRIVA |
| http://www.redhat.com/support/errata/RHSA-2011-09… | vendor-advisoryx_refsource_REDHAT |
| http://lists.apple.com/archives/security-announce… | vendor-advisoryx_refsource_APPLE |
| http://www.redhat.com/support/errata/RHSA-2011-09… | vendor-advisoryx_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=682332 | x_refsource_CONFIRM |
| http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk… | x_refsource_CONFIRM |
| http://www.mandriva.com/security/advisories?name=… | vendor-advisoryx_refsource_MANDRIVA |
| http://support.apple.com/kb/HT4581 | x_refsource_CONFIRM |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:43:15.487Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2011:0910",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"name": "1025236",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025236"
},
{
"name": "MDVSA-2011:098",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"name": "RHSA-2011:0909",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"name": "APPLE-SA-2011-03-21-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "RHSA-2011:0908",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993"
},
{
"name": "MDVSA-2011:097",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT4581"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-03-21T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-04-21T09:00:00.000Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"name": "RHSA-2011:0910",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"name": "1025236",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025236"
},
{
"name": "MDVSA-2011:098",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"name": "RHSA-2011:0909",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"name": "APPLE-SA-2011-03-21-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "RHSA-2011:0908",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993"
},
{
"name": "MDVSA-2011:097",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT4581"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0188",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2011:0910",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"name": "1025236",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025236"
},
{
"name": "MDVSA-2011:098",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"name": "RHSA-2011:0909",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "RHSA-2011:0908",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=682332",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"name": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993",
"refsource": "CONFIRM",
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993"
},
{
"name": "MDVSA-2011:097",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2011-0188",
"datePublished": "2011-03-23T01:00:00.000Z",
"dateReserved": "2010-12-23T00:00:00.000Z",
"dateUpdated": "2024-08-06T21:43:15.487Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2011-0188",
"date": "2026-05-17",
"epss": "0.01937",
"percentile": "0.83608"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.9.2-p136\", \"matchCriteriaId\": \"7999259C-95F6-474B-A828-1DEBFD20236D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9237145-35F8-4E05-B730-77C0F386E5B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*\", \"matchCriteriaId\": \"11743FC1-0DD5-4946-AECF-C9962BF7C21F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52179EC7-CAF0-42AA-A21A-7105E10CA122\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*\", \"matchCriteriaId\": \"D906EA97-7071-4CFA-84EF-EC82D813D7AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2D5127F-1E79-4F83-8BB0-C479B6CFE9AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31181BA2-71A7-40C8-9E08-8FEAB013977B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB8F3772-C973-41DB-AB3A-F4323418FC7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A688B357-7096-4362-A7DD-5A24FB0AF431\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46913DE9-8AE6-40E5-AEA1-6D2524EE7581\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C78BB1D8-0505-484D-B824-1AA219F8B247\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*\", \"matchCriteriaId\": \"470CF526-96F6-4DD1-B687-17106051A6D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*\", \"matchCriteriaId\": \"52159D9F-8CD3-4103-82E6-BDE035BA3625\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC0FD3F8-73A3-4518-8892-1E34D709FB89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B846CCE-7D1D-4A7E-95D8-50F92CF79AC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB99DD31-7355-4FF1-AE41-CC156F83D7A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7E15263-74D3-42D4-B37C-C649F68EDECC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA7FEA9B-06CE-4D08-9D61-2526ED5AE630\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D7F7EA5-7F6C-4C15-AB97-024836DC4862\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"236B38D1-0CCA-43C5-B2FC-1224F4F4E165\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5178D04D-1C29-4353-8987-559AA07443EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.2:dev:*:*:*:*:*:*\", \"matchCriteriaId\": \"D19F541D-98C2-42A6-9364-D6D9A279796E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1335E35A-D381-4056-9E78-37BC6DF8AD98\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C69DEE9-3FA5-408E-AD27-F5E7043F852A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D25D1FD3-C291-492C-83A7-0AFAFAADC98D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B565F77-C310-4B83-B098-22F9489C226C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"546EBFC8-79F0-42C2-9B9A-A76CA3F19470\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"119C8089-8C98-472E-9E9C-1741AA21DD35\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"831C5105-6409-4743-8FB5-A91D8956202F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B63D169-E2AA-4315-891F-B4AF99F2753C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82B4CD59-9F37-4EF0-BA43-427CFD6E1329\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26E34E35-CCE9-42BE-9AFF-561D8AA90E25\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A04FF6EE-D4DA-4D70-B0CE-154292828531\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9425320F-D119-49EB-9265-3159070DFE93\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF0D1051-F850-4A02-ABA0-968E1336A518\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1C9705A-74D4-43BA-A119-C667678F9A15\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BBF5FE5-4B25-47BE-8D9D-F228746408EC\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \\\"integer truncation issue.\\\"\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n VpMemAlloc en bigdecimal.c en la clase BigDecimal en Ruby v1.9.2-P136 y anteriores, tal como se utiliza en Apple Mac OS X antes de vv10.6.7 y en otras plataformas, no asigna memoria adecuadamente, lo que permite a atacantes dependientes de contexto ejecutar c\\u00f3digo de su elecci\\u00f3n o causar una denegaci\\u00f3n de servicio (ca\\u00edda de aplicaci\\u00f3n) a trav\\u00e9s de vectores que impliquen la creaci\\u00f3n de un valor BigDecimal grande dentro de un proceso de 64 bits, relacionado con un \\\"fallo de truncado de entero\\\".\"}]",
"evaluatorImpact": "Per: http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html\r\n\r\n \u0027This issue only affects 64-bit Ruby processes\u0027.",
"id": "CVE-2011-0188",
"lastModified": "2024-11-21T01:23:30.253",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2011-03-23T02:00:06.110",
"references": "[{\"url\": \"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html\", \"source\": \"product-security@apple.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4581\", \"source\": \"product-security@apple.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993\", \"source\": \"product-security@apple.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:097\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:098\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0908.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0909.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0910.html\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.securitytracker.com/id?1025236\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=682332\", \"source\": \"product-security@apple.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://support.apple.com/kb/HT4581\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:097\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:098\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0908.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0909.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2011-0910.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1025236\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=682332\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-189\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-0188\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2011-03-23T02:00:06.110\",\"lastModified\":\"2026-04-29T01:13:23.040\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \\\"integer truncation issue.\\\"\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n VpMemAlloc en bigdecimal.c en la clase BigDecimal en Ruby v1.9.2-P136 y anteriores, tal como se utiliza en Apple Mac OS X antes de vv10.6.7 y en otras plataformas, no asigna memoria adecuadamente, lo que permite a atacantes dependientes de contexto ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de vectores que impliquen la creaci\u00f3n de un valor BigDecimal grande dentro de un proceso de 64 bits, relacionado con un \\\"fallo de truncado de entero\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.9.2-p136\",\"matchCriteriaId\":\"7999259C-95F6-474B-A828-1DEBFD20236D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9237145-35F8-4E05-B730-77C0F386E5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*\",\"matchCriteriaId\":\"11743FC1-0DD5-4946-AECF-C9962BF7C21F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52179EC7-CAF0-42AA-A21A-7105E10CA122\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*\",\"matchCriteriaId\":\"D906EA97-7071-4CFA-84EF-EC82D813D7AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2D5127F-1E79-4F83-8BB0-C479B6CFE9AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31181BA2-71A7-40C8-9E08-8FEAB013977B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB8F3772-C973-41DB-AB3A-F4323418FC7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A688B357-7096-4362-A7DD-5A24FB0AF431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46913DE9-8AE6-40E5-AEA1-6D2524EE7581\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C78BB1D8-0505-484D-B824-1AA219F8B247\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*\",\"matchCriteriaId\":\"470CF526-96F6-4DD1-B687-17106051A6D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*\",\"matchCriteriaId\":\"52159D9F-8CD3-4103-82E6-BDE035BA3625\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC0FD3F8-73A3-4518-8892-1E34D709FB89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B846CCE-7D1D-4A7E-95D8-50F92CF79AC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB99DD31-7355-4FF1-AE41-CC156F83D7A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7E15263-74D3-42D4-B37C-C649F68EDECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA7FEA9B-06CE-4D08-9D61-2526ED5AE630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D7F7EA5-7F6C-4C15-AB97-024836DC4862\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"236B38D1-0CCA-43C5-B2FC-1224F4F4E165\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5178D04D-1C29-4353-8987-559AA07443EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.2:dev:*:*:*:*:*:*\",\"matchCriteriaId\":\"D19F541D-98C2-42A6-9364-D6D9A279796E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1335E35A-D381-4056-9E78-37BC6DF8AD98\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C69DEE9-3FA5-408E-AD27-F5E7043F852A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D25D1FD3-C291-492C-83A7-0AFAFAADC98D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B565F77-C310-4B83-B098-22F9489C226C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546EBFC8-79F0-42C2-9B9A-A76CA3F19470\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119C8089-8C98-472E-9E9C-1741AA21DD35\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831C5105-6409-4743-8FB5-A91D8956202F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B63D169-E2AA-4315-891F-B4AF99F2753C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82B4CD59-9F37-4EF0-BA43-427CFD6E1329\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26E34E35-CCE9-42BE-9AFF-561D8AA90E25\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A04FF6EE-D4DA-4D70-B0CE-154292828531\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9425320F-D119-49EB-9265-3159070DFE93\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF0D1051-F850-4A02-ABA0-968E1336A518\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1C9705A-74D4-43BA-A119-C667678F9A15\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BBF5FE5-4B25-47BE-8D9D-F228746408EC\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4581\",\"source\":\"product-security@apple.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993\",\"source\":\"product-security@apple.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:097\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:098\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0908.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0909.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0910.html\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.securitytracker.com/id?1025236\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=682332\",\"source\":\"product-security@apple.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4581\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:097\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:098\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0908.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0909.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0910.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1025236\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=682332\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}],\"evaluatorImpact\":\"Per: http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html\\r\\n\\r\\n \u0027This issue only affects 64-bit Ruby processes\u0027.\"}}"
}
}
RHSA-2026:7305
Vulnerability from csaf_redhat - Published: 2026-04-09 12:35 - Updated: 2026-05-13 01:49Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
A SMTP command injection flaw was found in the way Ruby's Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
Ruby's Net::FTP module trusted the IP address included in the FTP server's response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-3-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7305",
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27820",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3905",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3657",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3656",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3655",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-27282",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-31810",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-16254",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-8780",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-14064",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-10784",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-9096",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8090",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8080",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-6438",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-4975",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2013-1821",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2012-5371",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-4815",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-1891",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-28756",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-28739",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-41819",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-28965",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2020-25613",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2725",
"url": "https://access.redhat.com/security/cve/CVE-2008-2725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2663",
"url": "https://access.redhat.com/security/cve/CVE-2008-2663"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2726",
"url": "https://access.redhat.com/security/cve/CVE-2008-2726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2662",
"url": "https://access.redhat.com/security/cve/CVE-2008-2662"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-0188",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2664",
"url": "https://access.redhat.com/security/cve/CVE-2008-2664"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-3009",
"url": "https://access.redhat.com/security/cve/CVE-2011-3009"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-2686",
"url": "https://access.redhat.com/security/cve/CVE-2011-2686"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-2705",
"url": "https://access.redhat.com/security/cve/CVE-2011-2705"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2009-5147",
"url": "https://access.redhat.com/security/cve/CVE-2009-5147"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-7551",
"url": "https://access.redhat.com/security/cve/CVE-2015-7551"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7305.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-05-13T01:49:42+00:00",
"generator": {
"date": "2026-05-13T01:49:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:7305",
"initial_release_date": "2026-04-09T12:35:20+00:00",
"revision_history": [
{
"date": "2026-04-09T12:35:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-08T12:04:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-13T01:49:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@aarch64",
"product": {
"name": "ruby3-3-main@aarch64",
"product_id": "ruby3-3-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3@3.3.10-23.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@src",
"product": {
"name": "ruby3-3-main@src",
"product_id": "ruby3-3-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3@3.3.10-23.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@x86_64",
"product": {
"name": "ruby3-3-main@x86_64",
"product_id": "ruby3-3-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3@3.3.10-23.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@noarch",
"product": {
"name": "ruby3-3-main@noarch",
"product_id": "ruby3-3-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3-default-gems@3.3.10-23.1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@aarch64"
},
"product_reference": "ruby3-3-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@noarch"
},
"product_reference": "ruby3-3-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@src"
},
"product_reference": "ruby3-3-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@x86_64"
},
"product_reference": "ruby3-3-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1891",
"discovery_date": "2008-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443829"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick CGI source disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1891\n\nThe risks associated with fixing this flaw outweigh the benefits of the fix. Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "RHBZ#443829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891"
}
],
"release_date": "2008-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: WEBrick CGI source disclosure"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2662",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "450821"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Integer overflows in rb_str_buf_append()",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2662"
},
{
"category": "external",
"summary": "RHBZ#450821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=450821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2662",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2662"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Integer overflows in rb_str_buf_append()"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2663",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "450825"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Integer overflows in rb_ary_store()",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2663"
},
{
"category": "external",
"summary": "RHBZ#450825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=450825"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2663"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2663",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2663"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Integer overflows in rb_ary_store()"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2664",
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "450834"
}
],
"notes": [
{
"category": "description",
"text": "The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe use of alloca in rb_str_format()",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2664"
},
{
"category": "external",
"summary": "RHBZ#450834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=450834"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2664"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Unsafe use of alloca in rb_str_format()"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2725",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451821"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the \"REALLOC_N\" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: integer overflow in rb_ary_splice/update/replace() - REALLOC_N",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2725"
},
{
"category": "external",
"summary": "RHBZ#451821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2725",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2725"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: integer overflow in rb_ary_splice/update/replace() - REALLOC_N"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2726",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451828"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the \"beg + rlen\" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: integer overflow in rb_ary_splice/update/replace() - beg + rlen",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2726"
},
{
"category": "external",
"summary": "RHBZ#451828",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451828"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2726",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2726"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: integer overflow in rb_ary_splice/update/replace() - beg + rlen"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
},
{
"cve": "CVE-2009-5147",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2015-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1248935"
}
],
"notes": [
{
"category": "description",
"text": "DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: dlopen could open a library with tainted library name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future updates. \n\nFor additional information, refer to the Issue Severity Classification:\nhttps://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-5147"
},
{
"category": "external",
"summary": "RHBZ#1248935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248935"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-5147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-5147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5147"
}
],
"release_date": "2009-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: dlopen could open a library with tainted library name"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-2686",
"discovery_date": "2011-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "722415"
}
],
"notes": [
{
"category": "description",
"text": "Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Properly initialize the random number generator when forking new process",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2686"
},
{
"category": "external",
"summary": "RHBZ#722415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722415"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2686"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2686",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2686"
}
],
"release_date": "2011-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Properly initialize the random number generator when forking new process"
},
{
"cve": "CVE-2011-2705",
"discovery_date": "2011-07-07T00:00:00+00:00",
"notes": [
{
"category": "description",
"text": "The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Properly initialize the random number generator when forking new process",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2705"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2705",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2705"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2705",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2705"
}
],
"release_date": "2011-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Properly initialize the random number generator when forking new process"
},
{
"cve": "CVE-2011-3009",
"discovery_date": "2011-07-07T00:00:00+00:00",
"notes": [
{
"category": "description",
"text": "Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Properly initialize the random number generator when forking new process",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw in Red Hat Enterprise Linux 4 and 5.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3009"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3009",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3009"
}
],
"release_date": "2011-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Properly initialize the random number generator when forking new process"
},
{
"acknowledgments": [
{
"names": [
"oCERT"
]
}
],
"cve": "CVE-2011-4815",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750564"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "RHBZ#750564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-5371",
"discovery_date": "2012-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875236"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "RHBZ#875236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5371",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371"
}
],
"release_date": "2012-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"cve": "CVE-2014-4975",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2014-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1118158"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: off-by-one stack-based buffer overflow in the encodes() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "RHBZ#1118158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: off-by-one stack-based buffer overflow in the encodes() function"
},
{
"cve": "CVE-2014-6438",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2015-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490845"
}
],
"notes": [
{
"category": "description",
"text": "The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe parsing of long strings via decode_www_form_component method",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "RHBZ#1490845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/",
"url": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/"
}
],
"release_date": "2014-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unsafe parsing of long strings via decode_www_form_component method"
},
{
"cve": "CVE-2014-8080",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1157709"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML billion laughs attack via parameter entity expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "RHBZ#1157709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8080",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/",
"url": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/"
}
],
"release_date": "2014-10-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML billion laughs attack via parameter entity expansion"
},
{
"acknowledgments": [
{
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-8090",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1159927"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML incomplete fix for CVE-2014-8080",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "RHBZ#1159927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/",
"url": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/"
}
],
"release_date": "2014-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML incomplete fix for CVE-2014-8080"
},
{
"cve": "CVE-2015-7551",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2015-07-28T00:00:00+00:00",
"notes": [
{
"category": "description",
"text": "The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: dlopen could open a library with tainted library name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future updates. \n\nFor additional information, refer to the Issue Severity Classification:\nhttps://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-7551"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-7551",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7551"
}
],
"release_date": "2009-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: dlopen could open a library with tainted library name"
},
{
"cve": "CVE-2015-9096",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2017-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1461846"
}
],
"notes": [
{
"category": "description",
"text": "A SMTP command injection flaw was found in the way Ruby\u0027s Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "RHBZ#1461846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-9096",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096"
}
],
"release_date": "2017-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP"
},
{
"cve": "CVE-2017-10784",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2017-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1492012"
}
],
"notes": [
{
"category": "description",
"text": "It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections 3. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "RHBZ#1492012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
}
],
"release_date": "2017-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick"
},
{
"cve": "CVE-2017-14064",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487552"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter\u0027s heap memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary heap exposure during a JSON.generate call",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, and 6. These versions do not include the JSON module.\n\nThis issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "RHBZ#1487552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/"
}
],
"release_date": "2017-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Arbitrary heap exposure during a JSON.generate call"
},
{
"cve": "CVE-2018-8780",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561949"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "RHBZ#1561949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
}
],
"release_date": "2018-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "workaround",
"details": "It is possible to test for presence of the NULL byte manually prior to call a Dir method with an untrusted string.",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir"
},
{
"cve": "CVE-2019-16254",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789556"
}
],
"notes": [
{
"category": "description",
"text": "Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: HTTP response splitting in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "RHBZ#1789556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254"
}
],
"release_date": "2019-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: HTTP response splitting in WEBrick"
},
{
"cve": "CVE-2020-25613",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883623"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Potential HTTP request smuggling in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "RHBZ#1883623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25613"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/",
"url": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/"
}
],
"release_date": "2020-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Potential HTTP request smuggling in WEBrick"
},
{
"cve": "CVE-2021-28965",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947526"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: XML round-trip vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "RHBZ#1947526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947526"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965"
}
],
"release_date": "2021-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: XML round-trip vulnerability in REXML"
},
{
"cve": "CVE-2021-31810",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980126"
}
],
"notes": [
{
"category": "description",
"text": "Ruby\u0027s Net::FTP module trusted the IP address included in the FTP server\u0027s response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat CloudForms 5.11 does not ship Ruby or RubyGem net-ftp and thus not affected by the flaw. RubyGem net-sftp (Ruby implementation of Secure File Transfer Protocol) which product ship is different library component from the affected package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "RHBZ#1980126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980126"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/",
"url": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host"
},
{
"cve": "CVE-2021-41819",
"discovery_date": "2021-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2026757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Cookie prefix spoofing in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "RHBZ#2026757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819"
}
],
"release_date": "2021-11-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Cookie prefix spoofing in CGI::Cookie.parse"
},
{
"cve": "CVE-2022-28739",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2075687"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Buffer overrun in String-to-Float conversion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "RHBZ#2075687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075687"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/",
"url": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"
}
],
"release_date": "2022-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Buffer overrun in String-to-Float conversion"
},
{
"cve": "CVE-2023-28756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184061"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: ReDoS vulnerability in Time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "RHBZ#2184061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/",
"url": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"
}
],
"release_date": "2023-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: ReDoS vulnerability in Time"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276810"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary memory address read vulnerability with Regex search",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-27282 vulnerability in Ruby is classified as a Moderate severity issue due to its potential to expose arbitrary heap data relative to the start of the text through the Ruby regex compiler. While the vulnerability allows the extraction of pointers and sensitive strings from memory, its exploitation requires attacker-supplied data to be provided to the regex compiler. This means that an attacker would need to craft specific input to exploit the issue, limiting the ease of exploitation compared to vulnerabilities that might be remotely exploitable without user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "RHBZ#2276810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276810"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/",
"url": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"
}
],
"release_date": "2024-04-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Arbitrary memory address read vulnerability with Regex search"
},
{
"cve": "CVE-2026-27820",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-16T18:00:53.206650+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2459002"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A buffer overflow vulnerability exists in the Zlib::GzipReader component of the Ruby zlib interface. This flaw, caused by insufficient memory capacity during data manipulation, could lead to memory corruption and system instability. This vulnerability is considered of a Moderate severity this happens because the high complexity to exploit, additionally the attacker may have not full control over the data is being corrupted or exfiltrated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "RHBZ#2459002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w",
"url": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3467067",
"url": "https://hackerone.com/reports/3467067"
}
],
"release_date": "2026-04-16T17:27:48.944000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader"
}
]
}
RHSA-2011_0909
Vulnerability from csaf_redhat - Published: 2011-06-28 17:27 - Updated: 2024-11-22 04:24WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nA race condition flaw was found in the remove system entries method in the\nFileUtils module. If a local user ran a Ruby script that uses this method,\na local attacker could use this flaw to delete arbitrary files and\ndirectories accessible to that user via a symbolic link attack.\n(CVE-2011-1004)\n\nIt was found that WEBrick (the Ruby HTTP server toolkit) did not filter\nterminal escape sequences from its log files. A remote attacker could use\nspecially-crafted HTTP requests to inject terminal escape sequences into\nthe WEBrick log files. If a victim viewed the log files with a terminal\nemulator, it could result in control characters being executed with the\nprivileges of that user. (CVE-2009-4492)\n\nA cross-site scripting (XSS) flaw was found in the way WEBrick displayed\nerror pages. A remote attacker could use this flaw to perform a cross-site\nscripting attack against victims by tricking them into visiting a\nspecially-crafted URL. (CVE-2010-0541)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 and CVE-2010-0541 issues.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0909",
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/",
"url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/",
"url": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/"
},
{
"category": "external",
"summary": "554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0909.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T04:24:15+00:00",
"generator": {
"date": "2024-11-22T04:24:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0909",
"initial_release_date": "2011-06-28T17:27:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:27:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:33:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:24:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.src",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.src",
"product_id": "ruby-0:1.8.5-19.el5_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4492",
"discovery_date": "2009-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "554485"
}
],
"notes": [
{
"category": "description",
"text": "WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window\u0027s title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby WEBrick log escape sequence",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4492"
},
{
"category": "external",
"summary": "RHBZ#554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492"
}
],
"release_date": "2010-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby WEBrick log escape sequence"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2010-0541",
"discovery_date": "2010-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "587731"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby WEBrick javascript injection flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0541"
},
{
"category": "external",
"summary": "RHBZ#587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0541",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541"
}
],
"release_date": "2010-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby WEBrick javascript injection flaw"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1004",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678913"
}
],
"notes": [
{
"category": "description",
"text": "The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Symlink race condition by removing directory trees in fileutils module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1004"
},
{
"category": "external",
"summary": "RHBZ#678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ruby: Symlink race condition by removing directory trees in fileutils module"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
RHSA-2011:0909
Vulnerability from csaf_redhat - Published: 2011-06-28 17:27 - Updated: 2026-05-08 10:43WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nA race condition flaw was found in the remove system entries method in the\nFileUtils module. If a local user ran a Ruby script that uses this method,\na local attacker could use this flaw to delete arbitrary files and\ndirectories accessible to that user via a symbolic link attack.\n(CVE-2011-1004)\n\nIt was found that WEBrick (the Ruby HTTP server toolkit) did not filter\nterminal escape sequences from its log files. A remote attacker could use\nspecially-crafted HTTP requests to inject terminal escape sequences into\nthe WEBrick log files. If a victim viewed the log files with a terminal\nemulator, it could result in control characters being executed with the\nprivileges of that user. (CVE-2009-4492)\n\nA cross-site scripting (XSS) flaw was found in the way WEBrick displayed\nerror pages. A remote attacker could use this flaw to perform a cross-site\nscripting attack against victims by tricking them into visiting a\nspecially-crafted URL. (CVE-2010-0541)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 and CVE-2010-0541 issues.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0909",
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/",
"url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/",
"url": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/"
},
{
"category": "external",
"summary": "554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0909.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2026-05-08T10:43:32+00:00",
"generator": {
"date": "2026-05-08T10:43:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2011:0909",
"initial_release_date": "2011-06-28T17:27:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:27:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:33:49+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-08T10:43:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.src",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.src",
"product_id": "ruby-0:1.8.5-19.el5_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-19.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product_id": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-19.el5_6.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.s390",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4492",
"discovery_date": "2009-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "554485"
}
],
"notes": [
{
"category": "description",
"text": "WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window\u0027s title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby WEBrick log escape sequence",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4492"
},
{
"category": "external",
"summary": "RHBZ#554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492"
}
],
"release_date": "2010-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby WEBrick log escape sequence"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2010-0541",
"discovery_date": "2010-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "587731"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby WEBrick javascript injection flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0541"
},
{
"category": "external",
"summary": "RHBZ#587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0541",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541"
}
],
"release_date": "2010-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby WEBrick javascript injection flaw"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1004",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678913"
}
],
"notes": [
{
"category": "description",
"text": "The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Symlink race condition by removing directory trees in fileutils module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1004"
},
{
"category": "external",
"summary": "RHBZ#678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ruby: Symlink race condition by removing directory trees in fileutils module"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:27:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0909"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.src",
"5Server-5.6.Z:ruby-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-debuginfo-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-devel-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-docs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-irb-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.ppc64",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-libs-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-mode-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-rdoc-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-ri-0:1.8.5-19.el5_6.1.x86_64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.i386",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ia64",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.ppc",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.s390x",
"5Server-5.6.Z:ruby-tcltk-0:1.8.5-19.el5_6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
RHSA-2011:0910
Vulnerability from csaf_redhat - Published: 2011-06-28 17:30 - Updated: 2026-05-08 10:43The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix three security issues are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nA race condition flaw was found in the remove system entries method in the\nFileUtils module. If a local user ran a Ruby script that uses this method,\na local attacker could use this flaw to delete arbitrary files and\ndirectories accessible to that user via a symbolic link attack.\n(CVE-2011-1004)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 issue.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0910",
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0910.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2026-05-08T10:43:33+00:00",
"generator": {
"date": "2026-05-08T10:43:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2011:0910",
"initial_release_date": "2011-06-28T17:30:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:33:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-08T10:43:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1004",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678913"
}
],
"notes": [
{
"category": "description",
"text": "The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Symlink race condition by removing directory trees in fileutils module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1004"
},
{
"category": "external",
"summary": "RHBZ#678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ruby: Symlink race condition by removing directory trees in fileutils module"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
RHSA-2026:8838
Vulnerability from csaf_redhat - Published: 2026-04-17 23:15 - Updated: 2026-05-13 01:49Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
A SMTP command injection flaw was found in the way Ruby's Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
Ruby's Net::FTP module trusted the IP address included in the FTP server's response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby4-0-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:\n\nruby4.0:\n * ruby4.0-4.0.0-33.3.hum1 (aarch64, x86_64)\n * ruby4.0-bundled-gems-4.0.0-33.3.hum1 (aarch64, x86_64)\n * ruby4.0-default-gems-4.0.0-33.3.hum1 (noarch)\n * ruby4.0-devel-4.0.0-33.3.hum1 (aarch64, x86_64)\n * ruby4.0-doc-4.0.0-33.3.hum1 (noarch)\n * ruby4.0-libs-4.0.0-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-bigdecimal-4.0.1-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-bundler-4.0.3-33.3.hum1 (noarch)\n * rubygem4.0-devel-4.0.3-33.3.hum1 (noarch)\n * rubygem4.0-io-console-0.8.2-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-irb-1.16.0-33.3.hum1 (noarch)\n * rubygem4.0-json-2.18.0-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-minitest-6.0.0-33.3.hum1 (noarch)\n * rubygem4.0-power_assert-3.0.1-33.3.hum1 (noarch)\n * rubygem4.0-psych-5.3.1-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-racc-1.8.1-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-rake-13.3.1-33.3.hum1 (noarch)\n * rubygem4.0-rbs-3.10.0-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-rdoc-7.0.3-33.3.hum1 (noarch)\n * rubygem4.0-rexml-3.4.4-33.3.hum1 (noarch)\n * rubygem4.0-rss-0.3.2-33.3.hum1 (noarch)\n * rubygem4.0-rubygems-4.0.3-33.3.hum1 (noarch)\n * rubygem4.0-test-unit-3.7.5-33.3.hum1 (noarch)\n * rubygem4.0-typeprof-0.31.1-33.3.hum1 (noarch)\n * ruby4.0-4.0.0-33.3.hum1.src (src)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8838",
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27820",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3905",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3657",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3656",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3655",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-27282",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-31810",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-16254",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-8780",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-14064",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-10784",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-9096",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8090",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8080",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-6438",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-4975",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2013-1821",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2012-5371",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-4815",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-1891",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-28756",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-28739",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-41819",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-28965",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2020-25613",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-0188",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2662",
"url": "https://access.redhat.com/security/cve/CVE-2008-2662"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2725",
"url": "https://access.redhat.com/security/cve/CVE-2008-2725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2726",
"url": "https://access.redhat.com/security/cve/CVE-2008-2726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2663",
"url": "https://access.redhat.com/security/cve/CVE-2008-2663"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2664",
"url": "https://access.redhat.com/security/cve/CVE-2008-2664"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-3009",
"url": "https://access.redhat.com/security/cve/CVE-2011-3009"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-2686",
"url": "https://access.redhat.com/security/cve/CVE-2011-2686"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-2705",
"url": "https://access.redhat.com/security/cve/CVE-2011-2705"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2009-5147",
"url": "https://access.redhat.com/security/cve/CVE-2009-5147"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-7551",
"url": "https://access.redhat.com/security/cve/CVE-2015-7551"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8838.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-05-13T01:49:42+00:00",
"generator": {
"date": "2026-05-13T01:49:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:8838",
"initial_release_date": "2026-04-17T23:15:06+00:00",
"revision_history": [
{
"date": "2026-04-17T23:15:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-08T12:04:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-13T01:49:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@aarch64",
"product": {
"name": "ruby4-0-main@aarch64",
"product_id": "ruby4-0-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0@4.0.0-33.3.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@src",
"product": {
"name": "ruby4-0-main@src",
"product_id": "ruby4-0-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0@4.0.0-33.3.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@x86_64",
"product": {
"name": "ruby4-0-main@x86_64",
"product_id": "ruby4-0-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0@4.0.0-33.3.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@noarch",
"product": {
"name": "ruby4-0-main@noarch",
"product_id": "ruby4-0-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0-default-gems@4.0.0-33.3.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@aarch64"
},
"product_reference": "ruby4-0-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@noarch"
},
"product_reference": "ruby4-0-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@src"
},
"product_reference": "ruby4-0-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@x86_64"
},
"product_reference": "ruby4-0-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1891",
"discovery_date": "2008-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443829"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick CGI source disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1891\n\nThe risks associated with fixing this flaw outweigh the benefits of the fix. Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "RHBZ#443829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891"
}
],
"release_date": "2008-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: WEBrick CGI source disclosure"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2662",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "450821"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Integer overflows in rb_str_buf_append()",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2662"
},
{
"category": "external",
"summary": "RHBZ#450821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=450821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2662",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2662"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Integer overflows in rb_str_buf_append()"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2663",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "450825"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Integer overflows in rb_ary_store()",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2663"
},
{
"category": "external",
"summary": "RHBZ#450825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=450825"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2663"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2663",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2663"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Integer overflows in rb_ary_store()"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2664",
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "450834"
}
],
"notes": [
{
"category": "description",
"text": "The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe use of alloca in rb_str_format()",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2664"
},
{
"category": "external",
"summary": "RHBZ#450834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=450834"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2664"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Unsafe use of alloca in rb_str_format()"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2725",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451821"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the \"REALLOC_N\" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: integer overflow in rb_ary_splice/update/replace() - REALLOC_N",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2725"
},
{
"category": "external",
"summary": "RHBZ#451821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2725",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2725"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: integer overflow in rb_ary_splice/update/replace() - REALLOC_N"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2726",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451828"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the \"beg + rlen\" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: integer overflow in rb_ary_splice/update/replace() - beg + rlen",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2726"
},
{
"category": "external",
"summary": "RHBZ#451828",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451828"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2726",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2726"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: integer overflow in rb_ary_splice/update/replace() - beg + rlen"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
},
{
"cve": "CVE-2009-5147",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2015-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1248935"
}
],
"notes": [
{
"category": "description",
"text": "DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: dlopen could open a library with tainted library name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future updates. \n\nFor additional information, refer to the Issue Severity Classification:\nhttps://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-5147"
},
{
"category": "external",
"summary": "RHBZ#1248935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248935"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-5147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-5147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5147"
}
],
"release_date": "2009-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: dlopen could open a library with tainted library name"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-2686",
"discovery_date": "2011-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "722415"
}
],
"notes": [
{
"category": "description",
"text": "Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Properly initialize the random number generator when forking new process",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2686"
},
{
"category": "external",
"summary": "RHBZ#722415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722415"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2686"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2686",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2686"
}
],
"release_date": "2011-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Properly initialize the random number generator when forking new process"
},
{
"cve": "CVE-2011-2705",
"discovery_date": "2011-07-07T00:00:00+00:00",
"notes": [
{
"category": "description",
"text": "The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Properly initialize the random number generator when forking new process",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2705"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2705",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2705"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2705",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2705"
}
],
"release_date": "2011-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Properly initialize the random number generator when forking new process"
},
{
"cve": "CVE-2011-3009",
"discovery_date": "2011-07-07T00:00:00+00:00",
"notes": [
{
"category": "description",
"text": "Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Properly initialize the random number generator when forking new process",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw in Red Hat Enterprise Linux 4 and 5.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3009"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3009",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3009"
}
],
"release_date": "2011-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Properly initialize the random number generator when forking new process"
},
{
"acknowledgments": [
{
"names": [
"oCERT"
]
}
],
"cve": "CVE-2011-4815",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750564"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "RHBZ#750564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-5371",
"discovery_date": "2012-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875236"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "RHBZ#875236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5371",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371"
}
],
"release_date": "2012-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"cve": "CVE-2014-4975",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2014-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1118158"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: off-by-one stack-based buffer overflow in the encodes() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "RHBZ#1118158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: off-by-one stack-based buffer overflow in the encodes() function"
},
{
"cve": "CVE-2014-6438",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2015-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490845"
}
],
"notes": [
{
"category": "description",
"text": "The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe parsing of long strings via decode_www_form_component method",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "RHBZ#1490845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/",
"url": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/"
}
],
"release_date": "2014-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unsafe parsing of long strings via decode_www_form_component method"
},
{
"cve": "CVE-2014-8080",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1157709"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML billion laughs attack via parameter entity expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "RHBZ#1157709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8080",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/",
"url": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/"
}
],
"release_date": "2014-10-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML billion laughs attack via parameter entity expansion"
},
{
"acknowledgments": [
{
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-8090",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1159927"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML incomplete fix for CVE-2014-8080",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "RHBZ#1159927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/",
"url": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/"
}
],
"release_date": "2014-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML incomplete fix for CVE-2014-8080"
},
{
"cve": "CVE-2015-7551",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2015-07-28T00:00:00+00:00",
"notes": [
{
"category": "description",
"text": "The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: dlopen could open a library with tainted library name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future updates. \n\nFor additional information, refer to the Issue Severity Classification:\nhttps://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-7551"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-7551",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7551"
}
],
"release_date": "2009-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: dlopen could open a library with tainted library name"
},
{
"cve": "CVE-2015-9096",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2017-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1461846"
}
],
"notes": [
{
"category": "description",
"text": "A SMTP command injection flaw was found in the way Ruby\u0027s Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "RHBZ#1461846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-9096",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096"
}
],
"release_date": "2017-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP"
},
{
"cve": "CVE-2017-10784",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2017-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1492012"
}
],
"notes": [
{
"category": "description",
"text": "It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections 3. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "RHBZ#1492012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
}
],
"release_date": "2017-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick"
},
{
"cve": "CVE-2017-14064",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487552"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter\u0027s heap memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary heap exposure during a JSON.generate call",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, and 6. These versions do not include the JSON module.\n\nThis issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "RHBZ#1487552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/"
}
],
"release_date": "2017-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Arbitrary heap exposure during a JSON.generate call"
},
{
"cve": "CVE-2018-8780",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561949"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "RHBZ#1561949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
}
],
"release_date": "2018-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "workaround",
"details": "It is possible to test for presence of the NULL byte manually prior to call a Dir method with an untrusted string.",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir"
},
{
"cve": "CVE-2019-16254",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789556"
}
],
"notes": [
{
"category": "description",
"text": "Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: HTTP response splitting in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "RHBZ#1789556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254"
}
],
"release_date": "2019-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: HTTP response splitting in WEBrick"
},
{
"cve": "CVE-2020-25613",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883623"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Potential HTTP request smuggling in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "RHBZ#1883623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25613"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/",
"url": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/"
}
],
"release_date": "2020-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Potential HTTP request smuggling in WEBrick"
},
{
"cve": "CVE-2021-28965",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947526"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: XML round-trip vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "RHBZ#1947526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947526"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965"
}
],
"release_date": "2021-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: XML round-trip vulnerability in REXML"
},
{
"cve": "CVE-2021-31810",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980126"
}
],
"notes": [
{
"category": "description",
"text": "Ruby\u0027s Net::FTP module trusted the IP address included in the FTP server\u0027s response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat CloudForms 5.11 does not ship Ruby or RubyGem net-ftp and thus not affected by the flaw. RubyGem net-sftp (Ruby implementation of Secure File Transfer Protocol) which product ship is different library component from the affected package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "RHBZ#1980126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980126"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/",
"url": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host"
},
{
"cve": "CVE-2021-41819",
"discovery_date": "2021-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2026757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Cookie prefix spoofing in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "RHBZ#2026757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819"
}
],
"release_date": "2021-11-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Cookie prefix spoofing in CGI::Cookie.parse"
},
{
"cve": "CVE-2022-28739",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2075687"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Buffer overrun in String-to-Float conversion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "RHBZ#2075687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075687"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/",
"url": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"
}
],
"release_date": "2022-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Buffer overrun in String-to-Float conversion"
},
{
"cve": "CVE-2023-28756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184061"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: ReDoS vulnerability in Time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "RHBZ#2184061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/",
"url": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"
}
],
"release_date": "2023-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: ReDoS vulnerability in Time"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276810"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary memory address read vulnerability with Regex search",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-27282 vulnerability in Ruby is classified as a Moderate severity issue due to its potential to expose arbitrary heap data relative to the start of the text through the Ruby regex compiler. While the vulnerability allows the extraction of pointers and sensitive strings from memory, its exploitation requires attacker-supplied data to be provided to the regex compiler. This means that an attacker would need to craft specific input to exploit the issue, limiting the ease of exploitation compared to vulnerabilities that might be remotely exploitable without user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "RHBZ#2276810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276810"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/",
"url": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"
}
],
"release_date": "2024-04-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Arbitrary memory address read vulnerability with Regex search"
},
{
"cve": "CVE-2026-27820",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-16T18:00:53.206650+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2459002"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A buffer overflow vulnerability exists in the Zlib::GzipReader component of the Ruby zlib interface. This flaw, caused by insufficient memory capacity during data manipulation, could lead to memory corruption and system instability. This vulnerability is considered of a Moderate severity this happens because the high complexity to exploit, additionally the attacker may have not full control over the data is being corrupted or exfiltrated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "RHBZ#2459002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w",
"url": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3467067",
"url": "https://hackerone.com/reports/3467067"
}
],
"release_date": "2026-04-16T17:27:48.944000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader"
}
]
}
RHSA-2011_0910
Vulnerability from csaf_redhat - Published: 2011-06-28 17:30 - Updated: 2024-11-22 04:24The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix three security issues are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nA race condition flaw was found in the remove system entries method in the\nFileUtils module. If a local user ran a Ruby script that uses this method,\na local attacker could use this flaw to delete arbitrary files and\ndirectories accessible to that user via a symbolic link attack.\n(CVE-2011-1004)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 issue.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0910",
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0910.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T04:24:19+00:00",
"generator": {
"date": "2024-11-22T04:24:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0910",
"initial_release_date": "2011-06-28T17:30:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:33:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:24:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_id": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.299-7.el6_1.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product_id": "ruby-0:1.8.7.299-7.el6_1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.299-7.el6_1.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1004",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678913"
}
],
"notes": [
{
"category": "description",
"text": "The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Symlink race condition by removing directory trees in fileutils module",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1004"
},
{
"category": "external",
"summary": "RHBZ#678913",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678913"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1004",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1004"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1004"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Ruby: Symlink race condition by removing directory trees in fileutils module"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0910"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.src",
"6Server-optional-6.1.z:ruby-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-debuginfo-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-devel-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-docs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-irb-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-libs-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-rdoc-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-ri-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-static-0:1.8.7.299-7.el6_1.1.x86_64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.i686",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.ppc64",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.s390x",
"6Server-optional-6.1.z:ruby-tcltk-0:1.8.7.299-7.el6_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
RHSA-2026:7307
Vulnerability from csaf_redhat - Published: 2026-04-09 12:37 - Updated: 2026-05-13 01:49Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
CWE-190 - Integer Overflow or Wraparound| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
A SMTP command injection flaw was found in the way Ruby's Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
Ruby's Net::FTP module trusted the IP address included in the FTP server's response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
|
A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@aarch64 | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@noarch | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@src | — |
Vendor Fix
fix
Workaround
|
|
| Unresolved product id: Red Hat Hardened Images:ruby3-4-main@x86_64 | — |
Vendor Fix
fix
Workaround
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7307",
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27820",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3905",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3657",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3656",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3655",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-27282",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-31810",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-16254",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-8780",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-14064",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-10784",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-9096",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8090",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8080",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-6438",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-4975",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2013-1821",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2012-5371",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-4815",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-1891",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-28756",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-28739",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-41819",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-28965",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2020-25613",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2662",
"url": "https://access.redhat.com/security/cve/CVE-2008-2662"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2726",
"url": "https://access.redhat.com/security/cve/CVE-2008-2726"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2663",
"url": "https://access.redhat.com/security/cve/CVE-2008-2663"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2725",
"url": "https://access.redhat.com/security/cve/CVE-2008-2725"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-0188",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-2664",
"url": "https://access.redhat.com/security/cve/CVE-2008-2664"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-2686",
"url": "https://access.redhat.com/security/cve/CVE-2011-2686"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-3009",
"url": "https://access.redhat.com/security/cve/CVE-2011-3009"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-2705",
"url": "https://access.redhat.com/security/cve/CVE-2011-2705"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2009-5147",
"url": "https://access.redhat.com/security/cve/CVE-2009-5147"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-7551",
"url": "https://access.redhat.com/security/cve/CVE-2015-7551"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7307.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-05-13T01:49:42+00:00",
"generator": {
"date": "2026-05-13T01:49:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2026:7307",
"initial_release_date": "2026-04-09T12:37:08+00:00",
"revision_history": [
{
"date": "2026-04-09T12:37:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-05-08T12:04:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-13T01:49:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@aarch64",
"product": {
"name": "ruby3-4-main@aarch64",
"product_id": "ruby3-4-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4@3.4.8-31.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@src",
"product": {
"name": "ruby3-4-main@src",
"product_id": "ruby3-4-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4@3.4.8-31.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@x86_64",
"product": {
"name": "ruby3-4-main@x86_64",
"product_id": "ruby3-4-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4@3.4.8-31.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@noarch",
"product": {
"name": "ruby3-4-main@noarch",
"product_id": "ruby3-4-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4-default-gems@3.4.8-31.1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@aarch64"
},
"product_reference": "ruby3-4-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@noarch"
},
"product_reference": "ruby3-4-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@src"
},
"product_reference": "ruby3-4-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@x86_64"
},
"product_reference": "ruby3-4-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1891",
"discovery_date": "2008-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443829"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick CGI source disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1891\n\nThe risks associated with fixing this flaw outweigh the benefits of the fix. Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "RHBZ#443829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891"
}
],
"release_date": "2008-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: WEBrick CGI source disclosure"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2662",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "450821"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Integer overflows in rb_str_buf_append()",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2662"
},
{
"category": "external",
"summary": "RHBZ#450821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=450821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2662",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2662"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2662",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2662"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Integer overflows in rb_str_buf_append()"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2663",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "450825"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Integer overflows in rb_ary_store()",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2663"
},
{
"category": "external",
"summary": "RHBZ#450825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=450825"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2663",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2663"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2663",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2663"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Integer overflows in rb_ary_store()"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2664",
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "450834"
}
],
"notes": [
{
"category": "description",
"text": "The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe use of alloca in rb_str_format()",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2664"
},
{
"category": "external",
"summary": "RHBZ#450834",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=450834"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2664",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2664"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2664",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2664"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Unsafe use of alloca in rb_str_format()"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2725",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451821"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the \"REALLOC_N\" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: integer overflow in rb_ary_splice/update/replace() - REALLOC_N",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2725"
},
{
"category": "external",
"summary": "RHBZ#451821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2725",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2725"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2725",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2725"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: integer overflow in rb_ary_splice/update/replace() - REALLOC_N"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2008-2726",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2008-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451828"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the \"beg + rlen\" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: integer overflow in rb_ary_splice/update/replace() - beg + rlen",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2726"
},
{
"category": "external",
"summary": "RHBZ#451828",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451828"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2726",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2726"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2726",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2726"
}
],
"release_date": "2008-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: integer overflow in rb_ary_splice/update/replace() - beg + rlen"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
},
{
"cve": "CVE-2009-5147",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2015-07-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1248935"
}
],
"notes": [
{
"category": "description",
"text": "DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: dlopen could open a library with tainted library name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future updates. \n\nFor additional information, refer to the Issue Severity Classification:\nhttps://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-5147"
},
{
"category": "external",
"summary": "RHBZ#1248935",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248935"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-5147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5147"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-5147",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5147"
}
],
"release_date": "2009-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: dlopen could open a library with tainted library name"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-2686",
"discovery_date": "2011-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "722415"
}
],
"notes": [
{
"category": "description",
"text": "Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900. NOTE: this issue exists because of a regression during Ruby 1.8.6 development.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Properly initialize the random number generator when forking new process",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2686"
},
{
"category": "external",
"summary": "RHBZ#722415",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=722415"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2686"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2686",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2686"
}
],
"release_date": "2011-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Properly initialize the random number generator when forking new process"
},
{
"cve": "CVE-2011-2705",
"discovery_date": "2011-07-07T00:00:00+00:00",
"notes": [
{
"category": "description",
"text": "The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the result string by leveraging knowledge of random strings obtained in an earlier process with the same PID.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Properly initialize the random number generator when forking new process",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-2705"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-2705",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2705"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2705",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2705"
}
],
"release_date": "2011-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Properly initialize the random number generator when forking new process"
},
{
"cve": "CVE-2011-3009",
"discovery_date": "2011-07-07T00:00:00+00:00",
"notes": [
{
"category": "description",
"text": "Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Properly initialize the random number generator when forking new process",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw in Red Hat Enterprise Linux 4 and 5.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-3009"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3009"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3009",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3009"
}
],
"release_date": "2011-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Properly initialize the random number generator when forking new process"
},
{
"acknowledgments": [
{
"names": [
"oCERT"
]
}
],
"cve": "CVE-2011-4815",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750564"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "RHBZ#750564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-5371",
"discovery_date": "2012-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875236"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "RHBZ#875236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5371",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371"
}
],
"release_date": "2012-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"cve": "CVE-2014-4975",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2014-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1118158"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: off-by-one stack-based buffer overflow in the encodes() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "RHBZ#1118158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: off-by-one stack-based buffer overflow in the encodes() function"
},
{
"cve": "CVE-2014-6438",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2015-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490845"
}
],
"notes": [
{
"category": "description",
"text": "The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe parsing of long strings via decode_www_form_component method",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "RHBZ#1490845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/",
"url": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/"
}
],
"release_date": "2014-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unsafe parsing of long strings via decode_www_form_component method"
},
{
"cve": "CVE-2014-8080",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1157709"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML billion laughs attack via parameter entity expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "RHBZ#1157709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8080",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/",
"url": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/"
}
],
"release_date": "2014-10-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML billion laughs attack via parameter entity expansion"
},
{
"acknowledgments": [
{
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-8090",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1159927"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML incomplete fix for CVE-2014-8080",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "RHBZ#1159927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/",
"url": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/"
}
],
"release_date": "2014-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML incomplete fix for CVE-2014-8080"
},
{
"cve": "CVE-2015-7551",
"cwe": {
"id": "CWE-267",
"name": "Privilege Defined With Unsafe Actions"
},
"discovery_date": "2015-07-28T00:00:00+00:00",
"notes": [
{
"category": "description",
"text": "The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: dlopen could open a library with tainted library name",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this issue as having Low security\nimpact. This issue is not currently planned to be addressed in future updates. \n\nFor additional information, refer to the Issue Severity Classification:\nhttps://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-7551"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-7551",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7551"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7551",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7551"
}
],
"release_date": "2009-05-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: dlopen could open a library with tainted library name"
},
{
"cve": "CVE-2015-9096",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2017-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1461846"
}
],
"notes": [
{
"category": "description",
"text": "A SMTP command injection flaw was found in the way Ruby\u0027s Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "RHBZ#1461846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-9096",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096"
}
],
"release_date": "2017-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP"
},
{
"cve": "CVE-2017-10784",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2017-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1492012"
}
],
"notes": [
{
"category": "description",
"text": "It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections 3. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "RHBZ#1492012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
}
],
"release_date": "2017-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick"
},
{
"cve": "CVE-2017-14064",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487552"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter\u0027s heap memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary heap exposure during a JSON.generate call",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, and 6. These versions do not include the JSON module.\n\nThis issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "RHBZ#1487552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/"
}
],
"release_date": "2017-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Arbitrary heap exposure during a JSON.generate call"
},
{
"cve": "CVE-2018-8780",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561949"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "RHBZ#1561949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
}
],
"release_date": "2018-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "workaround",
"details": "It is possible to test for presence of the NULL byte manually prior to call a Dir method with an untrusted string.",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir"
},
{
"cve": "CVE-2019-16254",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789556"
}
],
"notes": [
{
"category": "description",
"text": "Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: HTTP response splitting in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "RHBZ#1789556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254"
}
],
"release_date": "2019-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: HTTP response splitting in WEBrick"
},
{
"cve": "CVE-2020-25613",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883623"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Potential HTTP request smuggling in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "RHBZ#1883623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25613"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/",
"url": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/"
}
],
"release_date": "2020-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Potential HTTP request smuggling in WEBrick"
},
{
"cve": "CVE-2021-28965",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947526"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: XML round-trip vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "RHBZ#1947526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947526"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965"
}
],
"release_date": "2021-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: XML round-trip vulnerability in REXML"
},
{
"cve": "CVE-2021-31810",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980126"
}
],
"notes": [
{
"category": "description",
"text": "Ruby\u0027s Net::FTP module trusted the IP address included in the FTP server\u0027s response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat CloudForms 5.11 does not ship Ruby or RubyGem net-ftp and thus not affected by the flaw. RubyGem net-sftp (Ruby implementation of Secure File Transfer Protocol) which product ship is different library component from the affected package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "RHBZ#1980126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980126"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/",
"url": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host"
},
{
"cve": "CVE-2021-41819",
"discovery_date": "2021-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2026757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Cookie prefix spoofing in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "RHBZ#2026757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819"
}
],
"release_date": "2021-11-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Cookie prefix spoofing in CGI::Cookie.parse"
},
{
"cve": "CVE-2022-28739",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2075687"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Buffer overrun in String-to-Float conversion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "RHBZ#2075687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075687"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/",
"url": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"
}
],
"release_date": "2022-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Buffer overrun in String-to-Float conversion"
},
{
"cve": "CVE-2023-28756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184061"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: ReDoS vulnerability in Time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "RHBZ#2184061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/",
"url": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"
}
],
"release_date": "2023-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: ReDoS vulnerability in Time"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276810"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary memory address read vulnerability with Regex search",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-27282 vulnerability in Ruby is classified as a Moderate severity issue due to its potential to expose arbitrary heap data relative to the start of the text through the Ruby regex compiler. While the vulnerability allows the extraction of pointers and sensitive strings from memory, its exploitation requires attacker-supplied data to be provided to the regex compiler. This means that an attacker would need to craft specific input to exploit the issue, limiting the ease of exploitation compared to vulnerabilities that might be remotely exploitable without user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "RHBZ#2276810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276810"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/",
"url": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"
}
],
"release_date": "2024-04-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Arbitrary memory address read vulnerability with Regex search"
},
{
"cve": "CVE-2026-27820",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-16T18:00:53.206650+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2459002"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A buffer overflow vulnerability exists in the Zlib::GzipReader component of the Ruby zlib interface. This flaw, caused by insufficient memory capacity during data manipulation, could lead to memory corruption and system instability. This vulnerability is considered of a Moderate severity this happens because the high complexity to exploit, additionally the attacker may have not full control over the data is being corrupted or exfiltrated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "RHBZ#2459002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w",
"url": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3467067",
"url": "https://hackerone.com/reports/3467067"
}
],
"release_date": "2026-04-16T17:27:48.944000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader"
}
]
}
RHSA-2011_0908
Vulnerability from csaf_redhat - Published: 2011-06-28 17:21 - Updated: 2024-11-22 04:24WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nIt was found that WEBrick (the Ruby HTTP server toolkit) did not filter\nterminal escape sequences from its log files. A remote attacker could use\nspecially-crafted HTTP requests to inject terminal escape sequences into\nthe WEBrick log files. If a victim viewed the log files with a terminal\nemulator, it could result in control characters being executed with the\nprivileges of that user. (CVE-2009-4492)\n\nA cross-site scripting (XSS) flaw was found in the way WEBrick displayed\nerror pages. A remote attacker could use this flaw to perform a cross-site\nscripting attack against victims by tricking them into visiting a\nspecially-crafted URL. (CVE-2010-0541)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 and CVE-2010-0541 issues.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0908",
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/",
"url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/",
"url": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/"
},
{
"category": "external",
"summary": "554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0908.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T04:24:10+00:00",
"generator": {
"date": "2024-11-22T04:24:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0908",
"initial_release_date": "2011-06-28T17:21:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:21:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:22:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:24:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.ia64",
"product": {
"name": "irb-0:1.8.1-16.el4.ia64",
"product_id": "irb-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64",
"product_id": "ruby-devel-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64",
"product_id": "ruby-docs-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64",
"product_id": "ruby-libs-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-0:1.8.1-16.el4.ia64",
"product_id": "ruby-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64",
"product_id": "ruby-mode-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.i386",
"product_id": "ruby-libs-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.i386",
"product": {
"name": "irb-0:1.8.1-16.el4.i386",
"product_id": "irb-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.i386",
"product_id": "ruby-devel-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.i386",
"product_id": "ruby-docs-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-0:1.8.1-16.el4.i386",
"product_id": "ruby-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.i386",
"product_id": "ruby-mode-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.x86_64",
"product": {
"name": "irb-0:1.8.1-16.el4.x86_64",
"product_id": "irb-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.src",
"product": {
"name": "ruby-0:1.8.1-16.el4.src",
"product_id": "ruby-0:1.8.1-16.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product_id": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.ppc",
"product": {
"name": "irb-0:1.8.1-16.el4.ppc",
"product_id": "irb-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc",
"product_id": "ruby-devel-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc",
"product_id": "ruby-docs-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc",
"product_id": "ruby-libs-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-0:1.8.1-16.el4.ppc",
"product_id": "ruby-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc",
"product_id": "ruby-mode-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.s390x",
"product": {
"name": "irb-0:1.8.1-16.el4.s390x",
"product_id": "irb-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x",
"product_id": "ruby-devel-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x",
"product_id": "ruby-docs-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x",
"product_id": "ruby-libs-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-0:1.8.1-16.el4.s390x",
"product_id": "ruby-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x",
"product_id": "ruby-mode-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.s390",
"product_id": "ruby-libs-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.s390",
"product": {
"name": "irb-0:1.8.1-16.el4.s390",
"product_id": "irb-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.s390",
"product_id": "ruby-devel-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.s390",
"product_id": "ruby-docs-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-0:1.8.1-16.el4.s390",
"product_id": "ruby-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.s390",
"product_id": "ruby-mode-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4492",
"discovery_date": "2009-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "554485"
}
],
"notes": [
{
"category": "description",
"text": "WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window\u0027s title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby WEBrick log escape sequence",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4492"
},
{
"category": "external",
"summary": "RHBZ#554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492"
}
],
"release_date": "2010-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby WEBrick log escape sequence"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2010-0541",
"discovery_date": "2010-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "587731"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby WEBrick javascript injection flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0541"
},
{
"category": "external",
"summary": "RHBZ#587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0541",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541"
}
],
"release_date": "2010-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby WEBrick javascript injection flaw"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
RHSA-2011:0908
Vulnerability from csaf_redhat - Published: 2011-06-28 17:21 - Updated: 2026-05-08 10:43WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:irb-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-devel-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-docs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-libs-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-mode-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. A context-dependent\nattacker could use this flaw to cause memory corruption, causing a Ruby\napplication that uses the BigDecimal class to crash or, possibly, execute\narbitrary code. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nIt was found that WEBrick (the Ruby HTTP server toolkit) did not filter\nterminal escape sequences from its log files. A remote attacker could use\nspecially-crafted HTTP requests to inject terminal escape sequences into\nthe WEBrick log files. If a victim viewed the log files with a terminal\nemulator, it could result in control characters being executed with the\nprivileges of that user. (CVE-2009-4492)\n\nA cross-site scripting (XSS) flaw was found in the way WEBrick displayed\nerror pages. A remote attacker could use this flaw to perform a cross-site\nscripting attack against victims by tricking them into visiting a\nspecially-crafted URL. (CVE-2010-0541)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 and CVE-2010-0541 issues.\n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0908",
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/",
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/",
"url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/",
"url": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/"
},
{
"category": "external",
"summary": "554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0908.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2026-05-08T10:43:31+00:00",
"generator": {
"date": "2026-05-08T10:43:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.9"
}
},
"id": "RHSA-2011:0908",
"initial_release_date": "2011-06-28T17:21:00+00:00",
"revision_history": [
{
"date": "2011-06-28T17:21:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-06-28T13:22:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-05-08T10:43:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.ia64",
"product": {
"name": "irb-0:1.8.1-16.el4.ia64",
"product_id": "irb-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64",
"product_id": "ruby-devel-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64",
"product_id": "ruby-docs-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64",
"product_id": "ruby-libs-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-0:1.8.1-16.el4.ia64",
"product_id": "ruby-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.ia64",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64",
"product_id": "ruby-mode-0:1.8.1-16.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.i386",
"product_id": "ruby-libs-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.i386",
"product": {
"name": "irb-0:1.8.1-16.el4.i386",
"product_id": "irb-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.i386",
"product_id": "ruby-devel-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.i386",
"product_id": "ruby-docs-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-0:1.8.1-16.el4.i386",
"product_id": "ruby-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.i386",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.i386",
"product_id": "ruby-mode-0:1.8.1-16.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.x86_64",
"product": {
"name": "irb-0:1.8.1-16.el4.x86_64",
"product_id": "irb-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-devel-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-docs-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-libs-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product_id": "ruby-mode-0:1.8.1-16.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.src",
"product": {
"name": "ruby-0:1.8.1-16.el4.src",
"product_id": "ruby-0:1.8.1-16.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product_id": "ruby-libs-0:1.8.1-16.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.ppc",
"product": {
"name": "irb-0:1.8.1-16.el4.ppc",
"product_id": "irb-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc",
"product_id": "ruby-devel-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc",
"product_id": "ruby-docs-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc",
"product_id": "ruby-libs-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-0:1.8.1-16.el4.ppc",
"product_id": "ruby-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.ppc",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc",
"product_id": "ruby-mode-0:1.8.1-16.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.s390x",
"product": {
"name": "irb-0:1.8.1-16.el4.s390x",
"product_id": "irb-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x",
"product_id": "ruby-devel-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x",
"product_id": "ruby-docs-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x",
"product_id": "ruby-libs-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-0:1.8.1-16.el4.s390x",
"product_id": "ruby-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.s390x",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x",
"product_id": "ruby-mode-0:1.8.1-16.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product_id": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-libs-0:1.8.1-16.el4.s390",
"product_id": "ruby-libs-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-16.el4.s390",
"product": {
"name": "irb-0:1.8.1-16.el4.s390",
"product_id": "irb-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-devel-0:1.8.1-16.el4.s390",
"product_id": "ruby-devel-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product_id": "ruby-tcltk-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-docs-0:1.8.1-16.el4.s390",
"product_id": "ruby-docs-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-0:1.8.1-16.el4.s390",
"product_id": "ruby-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-16.el4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-16.el4.s390",
"product": {
"name": "ruby-mode-0:1.8.1-16.el4.s390",
"product_id": "ruby-mode-0:1.8.1-16.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-16.el4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.i386"
},
"product_reference": "irb-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.ia64"
},
"product_reference": "irb-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.ppc"
},
"product_reference": "irb-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.s390"
},
"product_reference": "irb-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.s390x"
},
"product_reference": "irb-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-16.el4.x86_64"
},
"product_reference": "irb-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.src"
},
"product_reference": "ruby-0:1.8.1-16.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-16.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-16.el4.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-4492",
"discovery_date": "2009-12-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "554485"
}
],
"notes": [
{
"category": "description",
"text": "WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window\u0027s title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby WEBrick log escape sequence",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4492"
},
{
"category": "external",
"summary": "RHBZ#554485",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=554485"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4492",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4492"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4492"
}
],
"release_date": "2010-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby WEBrick log escape sequence"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2010-0541",
"discovery_date": "2010-04-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "587731"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the WEBrick HTTP server in Ruby in Apple Mac OS X 10.5.8, and 10.6 before 10.6.4, allows remote attackers to inject arbitrary web script or HTML via a crafted URI that triggers a UTF-7 error page.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby WEBrick javascript injection flaw",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0541"
},
{
"category": "external",
"summary": "RHBZ#587731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=587731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0541",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0541"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0541"
}
],
"release_date": "2010-05-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby WEBrick javascript injection flaw"
},
{
"acknowledgments": [
{
"names": [
"Drew Yao"
],
"organization": "Apple Product Security team"
}
],
"cve": "CVE-2011-0188",
"discovery_date": "2011-02-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "682332"
}
],
"notes": [
{
"category": "description",
"text": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: memory corruption in BigDecimal on 64bit platforms",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-0188"
},
{
"category": "external",
"summary": "RHBZ#682332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
}
],
"release_date": "2011-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: memory corruption in BigDecimal on 64bit platforms"
},
{
"cve": "CVE-2011-1005",
"discovery_date": "2011-02-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "678920"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Ruby: Untrusted codes able to modify arbitrary strings",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1005"
},
{
"category": "external",
"summary": "RHBZ#678920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=678920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1005",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1005"
}
],
"release_date": "2011-02-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-06-28T17:21:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0908"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-16.el4.i386",
"4AS:irb-0:1.8.1-16.el4.ia64",
"4AS:irb-0:1.8.1-16.el4.ppc",
"4AS:irb-0:1.8.1-16.el4.s390",
"4AS:irb-0:1.8.1-16.el4.s390x",
"4AS:irb-0:1.8.1-16.el4.x86_64",
"4AS:ruby-0:1.8.1-16.el4.i386",
"4AS:ruby-0:1.8.1-16.el4.ia64",
"4AS:ruby-0:1.8.1-16.el4.ppc",
"4AS:ruby-0:1.8.1-16.el4.s390",
"4AS:ruby-0:1.8.1-16.el4.s390x",
"4AS:ruby-0:1.8.1-16.el4.src",
"4AS:ruby-0:1.8.1-16.el4.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4AS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4AS:ruby-devel-0:1.8.1-16.el4.i386",
"4AS:ruby-devel-0:1.8.1-16.el4.ia64",
"4AS:ruby-devel-0:1.8.1-16.el4.ppc",
"4AS:ruby-devel-0:1.8.1-16.el4.s390",
"4AS:ruby-devel-0:1.8.1-16.el4.s390x",
"4AS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4AS:ruby-docs-0:1.8.1-16.el4.i386",
"4AS:ruby-docs-0:1.8.1-16.el4.ia64",
"4AS:ruby-docs-0:1.8.1-16.el4.ppc",
"4AS:ruby-docs-0:1.8.1-16.el4.s390",
"4AS:ruby-docs-0:1.8.1-16.el4.s390x",
"4AS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-libs-0:1.8.1-16.el4.i386",
"4AS:ruby-libs-0:1.8.1-16.el4.ia64",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc",
"4AS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4AS:ruby-libs-0:1.8.1-16.el4.s390",
"4AS:ruby-libs-0:1.8.1-16.el4.s390x",
"4AS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4AS:ruby-mode-0:1.8.1-16.el4.i386",
"4AS:ruby-mode-0:1.8.1-16.el4.ia64",
"4AS:ruby-mode-0:1.8.1-16.el4.ppc",
"4AS:ruby-mode-0:1.8.1-16.el4.s390",
"4AS:ruby-mode-0:1.8.1-16.el4.s390x",
"4AS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4AS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4AS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4AS:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4Desktop:irb-0:1.8.1-16.el4.i386",
"4Desktop:irb-0:1.8.1-16.el4.ia64",
"4Desktop:irb-0:1.8.1-16.el4.ppc",
"4Desktop:irb-0:1.8.1-16.el4.s390",
"4Desktop:irb-0:1.8.1-16.el4.s390x",
"4Desktop:irb-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-0:1.8.1-16.el4.i386",
"4Desktop:ruby-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-0:1.8.1-16.el4.s390",
"4Desktop:ruby-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-0:1.8.1-16.el4.src",
"4Desktop:ruby-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.i386",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-devel-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390",
"4Desktop:ruby-devel-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-devel-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-docs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-docs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-docs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.i386",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-libs-0:1.8.1-16.el4.ppc64",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390",
"4Desktop:ruby-libs-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-libs-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.i386",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-mode-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390",
"4Desktop:ruby-mode-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-mode-0:1.8.1-16.el4.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.i386",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4ES:irb-0:1.8.1-16.el4.i386",
"4ES:irb-0:1.8.1-16.el4.ia64",
"4ES:irb-0:1.8.1-16.el4.ppc",
"4ES:irb-0:1.8.1-16.el4.s390",
"4ES:irb-0:1.8.1-16.el4.s390x",
"4ES:irb-0:1.8.1-16.el4.x86_64",
"4ES:ruby-0:1.8.1-16.el4.i386",
"4ES:ruby-0:1.8.1-16.el4.ia64",
"4ES:ruby-0:1.8.1-16.el4.ppc",
"4ES:ruby-0:1.8.1-16.el4.s390",
"4ES:ruby-0:1.8.1-16.el4.s390x",
"4ES:ruby-0:1.8.1-16.el4.src",
"4ES:ruby-0:1.8.1-16.el4.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4ES:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4ES:ruby-devel-0:1.8.1-16.el4.i386",
"4ES:ruby-devel-0:1.8.1-16.el4.ia64",
"4ES:ruby-devel-0:1.8.1-16.el4.ppc",
"4ES:ruby-devel-0:1.8.1-16.el4.s390",
"4ES:ruby-devel-0:1.8.1-16.el4.s390x",
"4ES:ruby-devel-0:1.8.1-16.el4.x86_64",
"4ES:ruby-docs-0:1.8.1-16.el4.i386",
"4ES:ruby-docs-0:1.8.1-16.el4.ia64",
"4ES:ruby-docs-0:1.8.1-16.el4.ppc",
"4ES:ruby-docs-0:1.8.1-16.el4.s390",
"4ES:ruby-docs-0:1.8.1-16.el4.s390x",
"4ES:ruby-docs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-libs-0:1.8.1-16.el4.i386",
"4ES:ruby-libs-0:1.8.1-16.el4.ia64",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc",
"4ES:ruby-libs-0:1.8.1-16.el4.ppc64",
"4ES:ruby-libs-0:1.8.1-16.el4.s390",
"4ES:ruby-libs-0:1.8.1-16.el4.s390x",
"4ES:ruby-libs-0:1.8.1-16.el4.x86_64",
"4ES:ruby-mode-0:1.8.1-16.el4.i386",
"4ES:ruby-mode-0:1.8.1-16.el4.ia64",
"4ES:ruby-mode-0:1.8.1-16.el4.ppc",
"4ES:ruby-mode-0:1.8.1-16.el4.s390",
"4ES:ruby-mode-0:1.8.1-16.el4.s390x",
"4ES:ruby-mode-0:1.8.1-16.el4.x86_64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.i386",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4ES:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390",
"4ES:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4ES:ruby-tcltk-0:1.8.1-16.el4.x86_64",
"4WS:irb-0:1.8.1-16.el4.i386",
"4WS:irb-0:1.8.1-16.el4.ia64",
"4WS:irb-0:1.8.1-16.el4.ppc",
"4WS:irb-0:1.8.1-16.el4.s390",
"4WS:irb-0:1.8.1-16.el4.s390x",
"4WS:irb-0:1.8.1-16.el4.x86_64",
"4WS:ruby-0:1.8.1-16.el4.i386",
"4WS:ruby-0:1.8.1-16.el4.ia64",
"4WS:ruby-0:1.8.1-16.el4.ppc",
"4WS:ruby-0:1.8.1-16.el4.s390",
"4WS:ruby-0:1.8.1-16.el4.s390x",
"4WS:ruby-0:1.8.1-16.el4.src",
"4WS:ruby-0:1.8.1-16.el4.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.i386",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ia64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.s390x",
"4WS:ruby-debuginfo-0:1.8.1-16.el4.x86_64",
"4WS:ruby-devel-0:1.8.1-16.el4.i386",
"4WS:ruby-devel-0:1.8.1-16.el4.ia64",
"4WS:ruby-devel-0:1.8.1-16.el4.ppc",
"4WS:ruby-devel-0:1.8.1-16.el4.s390",
"4WS:ruby-devel-0:1.8.1-16.el4.s390x",
"4WS:ruby-devel-0:1.8.1-16.el4.x86_64",
"4WS:ruby-docs-0:1.8.1-16.el4.i386",
"4WS:ruby-docs-0:1.8.1-16.el4.ia64",
"4WS:ruby-docs-0:1.8.1-16.el4.ppc",
"4WS:ruby-docs-0:1.8.1-16.el4.s390",
"4WS:ruby-docs-0:1.8.1-16.el4.s390x",
"4WS:ruby-docs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-libs-0:1.8.1-16.el4.i386",
"4WS:ruby-libs-0:1.8.1-16.el4.ia64",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc",
"4WS:ruby-libs-0:1.8.1-16.el4.ppc64",
"4WS:ruby-libs-0:1.8.1-16.el4.s390",
"4WS:ruby-libs-0:1.8.1-16.el4.s390x",
"4WS:ruby-libs-0:1.8.1-16.el4.x86_64",
"4WS:ruby-mode-0:1.8.1-16.el4.i386",
"4WS:ruby-mode-0:1.8.1-16.el4.ia64",
"4WS:ruby-mode-0:1.8.1-16.el4.ppc",
"4WS:ruby-mode-0:1.8.1-16.el4.s390",
"4WS:ruby-mode-0:1.8.1-16.el4.s390x",
"4WS:ruby-mode-0:1.8.1-16.el4.x86_64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.i386",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ia64",
"4WS:ruby-tcltk-0:1.8.1-16.el4.ppc",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390",
"4WS:ruby-tcltk-0:1.8.1-16.el4.s390x",
"4WS:ruby-tcltk-0:1.8.1-16.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Ruby: Untrusted codes able to modify arbitrary strings"
}
]
}
GSD-2011-0188
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-0188",
"description": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"id": "GSD-2011-0188",
"references": [
"https://www.suse.com/security/cve/CVE-2011-0188.html",
"https://access.redhat.com/errata/RHSA-2011:0910",
"https://access.redhat.com/errata/RHSA-2011:0909",
"https://access.redhat.com/errata/RHSA-2011:0908",
"https://linux.oracle.com/cve/CVE-2011-0188.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-0188"
],
"details": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"id": "GSD-2011-0188",
"modified": "2023-12-13T01:19:05.114512Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0188",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2011:0910",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"name": "1025236",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025236"
},
{
"name": "MDVSA-2011:098",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"name": "RHSA-2011:0909",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "RHSA-2011:0908",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=682332",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"name": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993",
"refsource": "CONFIRM",
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993"
},
{
"name": "MDVSA-2011:097",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT4581"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.9.2-p136",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.2:dev:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2011-0188"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://support.apple.com/kb/HT4581",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "http://support.apple.com/kb/HT4581"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=682332",
"refsource": "CONFIRM",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"name": "APPLE-SA-2011-03-21-1",
"refsource": "APPLE",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"name": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993"
},
{
"name": "1025236",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1025236"
},
{
"name": "RHSA-2011:0910",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"name": "RHSA-2011:0908",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"name": "RHSA-2011:0909",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"name": "MDVSA-2011:097",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"name": "MDVSA-2011:098",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2011-08-24T03:15Z",
"publishedDate": "2011-03-23T02:00Z"
}
}
}
GHSA-6VCH-6CGR-X9C3
Vulnerability from github – Published: 2022-05-17 05:39 – Updated: 2022-05-17 05:39The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
{
"affected": [],
"aliases": [
"CVE-2011-0188"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-03-23T02:00:00Z",
"severity": "MODERATE"
},
"details": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\"",
"id": "GHSA-6vch-6cgr-x9c3",
"modified": "2022-05-17T05:39:50Z",
"published": "2022-05-17T05:39:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0188"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT4581"
},
{
"type": "WEB",
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1025236"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2011-AVI-162
Vulnerability from certfr_avis - Published: - Updated:
De nombreuses vulnérabilités ont été corrigées dans Mac OS X. Leur exploitation permet, entre autres, l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été corrigées dans différents composants du système d'exploitation Mac OS X, notamment :
- Airport ;
- AppleScript ;
- ATS ;
- CarbonCore ;
- CoreText ;
- File Quarantine ;
- HFS ;
- ImageIO ;
- ImageRaw ;
- Installer ;
- Kernel ;
- Libinfo ;
- Libxml ;
- QuickLook ;
- QuickTime ;
- Terminal.
Cette mise à jour corrige également un grand nombre de vulnérabilités dans des logiciels inclus au système d'exploitation comme Apache, ClamAV, Kerberos, Mailman, PHP, Ruby, Samba, Subversion et X11. Parmi les failles corrigées, certaines permettent l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X 10.5.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.6.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X 10.6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans diff\u00e9rents composants\ndu syst\u00e8me d\u0027exploitation Mac OS X, notamment :\n\n- Airport ;\n- AppleScript ;\n- ATS ;\n- CarbonCore ;\n- CoreText ;\n- File Quarantine ;\n- HFS ;\n- ImageIO ;\n- ImageRaw ;\n- Installer ;\n- Kernel ;\n- Libinfo ;\n- Libxml ;\n- QuickLook ;\n- QuickTime ;\n- Terminal.\n\nCette mise \u00e0 jour corrige \u00e9galement un grand nombre de vuln\u00e9rabilit\u00e9s\ndans des logiciels inclus au syst\u00e8me d\u0027exploitation comme Apache,\nClamAV, Kerberos, Mailman, PHP, Ruby, Samba, Subversion et X11. Parmi\nles failles corrig\u00e9es, certaines permettent l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0170"
},
{
"name": "CVE-2010-3089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3089"
},
{
"name": "CVE-2010-3870",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3870"
},
{
"name": "CVE-2011-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0187"
},
{
"name": "CVE-2010-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3709"
},
{
"name": "CVE-2010-4020",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4020"
},
{
"name": "CVE-2011-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0172"
},
{
"name": "CVE-2011-0181",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0181"
},
{
"name": "CVE-2011-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0192"
},
{
"name": "CVE-2010-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3710"
},
{
"name": "CVE-2011-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0183"
},
{
"name": "CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"name": "CVE-2011-0182",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0182"
},
{
"name": "CVE-2010-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2068"
},
{
"name": "CVE-2010-1452",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
},
{
"name": "CVE-2010-4021",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4021"
},
{
"name": "CVE-2011-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0173"
},
{
"name": "CVE-2010-0405",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0405"
},
{
"name": "CVE-2010-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2950"
},
{
"name": "CVE-2011-0191",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0191"
},
{
"name": "CVE-2011-0186",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0186"
},
{
"name": "CVE-2011-0178",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0178"
},
{
"name": "CVE-2010-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3802"
},
{
"name": "CVE-2010-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4409"
},
{
"name": "CVE-2011-0190",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0190"
},
{
"name": "CVE-2011-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1417"
},
{
"name": "CVE-2010-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3801"
},
{
"name": "CVE-2010-4479",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4479"
},
{
"name": "CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"name": "CVE-2010-3814",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3814"
},
{
"name": "CVE-2010-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3855"
},
{
"name": "CVE-2011-0180",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0180"
},
{
"name": "CVE-2010-1324",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1324"
},
{
"name": "CVE-2011-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0174"
},
{
"name": "CVE-2011-0189",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0189"
},
{
"name": "CVE-2006-7243",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7243"
},
{
"name": "CVE-2010-4261",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4261"
},
{
"name": "CVE-2010-3434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3434"
},
{
"name": "CVE-2010-4260",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4260"
},
{
"name": "CVE-2010-3315",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3315"
},
{
"name": "CVE-2011-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0184"
},
{
"name": "CVE-2011-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0179"
},
{
"name": "CVE-2010-3069",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3069"
},
{
"name": "CVE-2011-0177",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0177"
},
{
"name": "CVE-2010-1323",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1323"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2010-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3436"
},
{
"name": "CVE-2011-0194",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0194"
},
{
"name": "CVE-2011-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0175"
},
{
"name": "CVE-2010-4150",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4150"
},
{
"name": "CVE-2011-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0193"
},
{
"name": "CVE-2011-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0176"
},
{
"name": "CVE-2010-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4009"
}
],
"links": [],
"reference": "CERTA-2011-AVI-162",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-03-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X. Leur\nexploitation permet, entre autres, l\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4581 du 21 mars 2011",
"url": "http://support.apple.com/kb/HT4581"
}
]
}
CERTA-2011-AVI-162
Vulnerability from certfr_avis - Published: - Updated:
De nombreuses vulnérabilités ont été corrigées dans Mac OS X. Leur exploitation permet, entre autres, l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été corrigées dans différents composants du système d'exploitation Mac OS X, notamment :
- Airport ;
- AppleScript ;
- ATS ;
- CarbonCore ;
- CoreText ;
- File Quarantine ;
- HFS ;
- ImageIO ;
- ImageRaw ;
- Installer ;
- Kernel ;
- Libinfo ;
- Libxml ;
- QuickLook ;
- QuickTime ;
- Terminal.
Cette mise à jour corrige également un grand nombre de vulnérabilités dans des logiciels inclus au système d'exploitation comme Apache, ClamAV, Kerberos, Mailman, PHP, Ruby, Samba, Subversion et X11. Parmi les failles corrigées, certaines permettent l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X 10.5.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.6.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5.8 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Mac OS X 10.6.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans diff\u00e9rents composants\ndu syst\u00e8me d\u0027exploitation Mac OS X, notamment :\n\n- Airport ;\n- AppleScript ;\n- ATS ;\n- CarbonCore ;\n- CoreText ;\n- File Quarantine ;\n- HFS ;\n- ImageIO ;\n- ImageRaw ;\n- Installer ;\n- Kernel ;\n- Libinfo ;\n- Libxml ;\n- QuickLook ;\n- QuickTime ;\n- Terminal.\n\nCette mise \u00e0 jour corrige \u00e9galement un grand nombre de vuln\u00e9rabilit\u00e9s\ndans des logiciels inclus au syst\u00e8me d\u0027exploitation comme Apache,\nClamAV, Kerberos, Mailman, PHP, Ruby, Samba, Subversion et X11. Parmi\nles failles corrig\u00e9es, certaines permettent l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0170"
},
{
"name": "CVE-2010-3089",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3089"
},
{
"name": "CVE-2010-3870",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3870"
},
{
"name": "CVE-2011-0187",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0187"
},
{
"name": "CVE-2010-3709",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3709"
},
{
"name": "CVE-2010-4020",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4020"
},
{
"name": "CVE-2011-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0172"
},
{
"name": "CVE-2011-0181",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0181"
},
{
"name": "CVE-2011-0192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0192"
},
{
"name": "CVE-2010-3710",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3710"
},
{
"name": "CVE-2011-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0183"
},
{
"name": "CVE-2010-4494",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4494"
},
{
"name": "CVE-2011-0182",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0182"
},
{
"name": "CVE-2010-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2068"
},
{
"name": "CVE-2010-1452",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
},
{
"name": "CVE-2010-4021",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4021"
},
{
"name": "CVE-2011-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0173"
},
{
"name": "CVE-2010-0405",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0405"
},
{
"name": "CVE-2010-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2950"
},
{
"name": "CVE-2011-0191",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0191"
},
{
"name": "CVE-2011-0186",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0186"
},
{
"name": "CVE-2011-0178",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0178"
},
{
"name": "CVE-2010-3802",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3802"
},
{
"name": "CVE-2010-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4409"
},
{
"name": "CVE-2011-0190",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0190"
},
{
"name": "CVE-2011-1417",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1417"
},
{
"name": "CVE-2010-3801",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3801"
},
{
"name": "CVE-2010-4479",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4479"
},
{
"name": "CVE-2011-0188",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0188"
},
{
"name": "CVE-2010-3814",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3814"
},
{
"name": "CVE-2010-3855",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3855"
},
{
"name": "CVE-2011-0180",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0180"
},
{
"name": "CVE-2010-1324",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1324"
},
{
"name": "CVE-2011-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0174"
},
{
"name": "CVE-2011-0189",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0189"
},
{
"name": "CVE-2006-7243",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7243"
},
{
"name": "CVE-2010-4261",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4261"
},
{
"name": "CVE-2010-3434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3434"
},
{
"name": "CVE-2010-4260",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4260"
},
{
"name": "CVE-2010-3315",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3315"
},
{
"name": "CVE-2011-0184",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0184"
},
{
"name": "CVE-2011-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0179"
},
{
"name": "CVE-2010-3069",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3069"
},
{
"name": "CVE-2011-0177",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0177"
},
{
"name": "CVE-2010-1323",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1323"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2010-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3436"
},
{
"name": "CVE-2011-0194",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0194"
},
{
"name": "CVE-2011-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0175"
},
{
"name": "CVE-2010-4150",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4150"
},
{
"name": "CVE-2011-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0193"
},
{
"name": "CVE-2011-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0176"
},
{
"name": "CVE-2010-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4009"
}
],
"links": [],
"reference": "CERTA-2011-AVI-162",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-03-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Mac OS X. Leur\nexploitation permet, entre autres, l\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT4581 du 21 mars 2011",
"url": "http://support.apple.com/kb/HT4581"
}
]
}
VAR-201103-0287
Vulnerability from variot - Updated: 2024-07-23 19:54The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue.". Ruby is prone to a remote code-execution vulnerability because it fails to properly sanitize user-supplied input. A successful exploit can allow an attacker to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. Ruby 1.9.2 is vulnerable; other versions may also be affected. NOTE: This issue was previously described in BID 46950 (Apple Mac OS X Prior to 10.6.7 Multiple Security Vulnerabilities) but has been given its own record to better document it. Apple Mac OS X is a dedicated operating system developed by Apple for Mac computers.
The safe-level feature in Ruby allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname (CVE-2011-1005). (CVE-2011-0188). The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFN2kOHmqjQ0CJFipgRAjT0AKCi4//MacXhajM4lSZ24BbA8dHPkwCgsYXk ieo0ut/wYOOUFl6E8bWk+gA= =S8F9 -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . (CVE-2011-1004)
It was found that WEBrick (the Ruby HTTP server toolkit) did not filter terminal escape sequences from its log files. A remote attacker could use specially-crafted HTTP requests to inject terminal escape sequences into the WEBrick log files. If a victim viewed the log files with a terminal emulator, it could result in control characters being executed with the privileges of that user. (CVE-2009-4492)
A cross-site scripting (XSS) flaw was found in the way WEBrick displayed error pages. A remote attacker could use this flaw to perform a cross-site scripting attack against victims by tricking them into visiting a specially-crafted URL. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201412-27
http://security.gentoo.org/
Severity: Normal Title: Ruby: Denial of Service Date: December 13, 2014 Bugs: #355439, #369141, #396301, #437366, #442580, #458776, #492282, #527084, #529216 ID: 201412-27
Synopsis
Multiple vulnerabilities have been found in Ruby, allowing context-dependent attackers to cause a Denial of Service condition. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All Ruby 1.9 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.9.3_p551"
All Ruby 2.0 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/ruby-2.0.0_p598"
References
[ 1 ] CVE-2011-0188 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0188 [ 2 ] CVE-2011-1004 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1004 [ 3 ] CVE-2011-1005 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1005 [ 4 ] CVE-2011-4815 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4815 [ 5 ] CVE-2012-4481 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4481 [ 6 ] CVE-2012-5371 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5371 [ 7 ] CVE-2013-0269 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0269 [ 8 ] CVE-2013-1821 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1821 [ 9 ] CVE-2013-4164 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4164 [ 10 ] CVE-2014-8080 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8080 [ 11 ] CVE-2014-8090 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8090
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201412-27.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: ruby security update Advisory ID: RHSA-2011:0910-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2011-0910.html Issue date: 2011-06-28 CVE Names: CVE-2011-0188 CVE-2011-1004 CVE-2011-1005 =====================================================================
- Summary:
Updated ruby packages that fix three security issues are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64
- Description:
Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to do system management tasks.
A flaw was found in the way large amounts of memory were allocated on 64-bit systems when using the BigDecimal class. This issue did not affect 32-bit systems. (CVE-2011-0188)
A race condition flaw was found in the remove system entries method in the FileUtils module. If a local user ran a Ruby script that uses this method, a local attacker could use this flaw to delete arbitrary files and directories accessible to that user via a symbolic link attack. (CVE-2011-1004)
A flaw was found in the method for translating an exception message into a string in the Exception class. A remote attacker could use this flaw to bypass safe level 4 restrictions, allowing untrusted (tainted) code to modify arbitrary, trusted (untainted) strings, which safe level 4 restrictions would otherwise prevent. (CVE-2011-1005)
Red Hat would like to thank Drew Yao of Apple Product Security for reporting the CVE-2011-0188 issue.
All Ruby users should upgrade to these updated packages, which contain backported patches to resolve these issues.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Bugs fixed (http://bugzilla.redhat.com/):
678913 - CVE-2011-1004 Ruby: Symlink race condition by removing directory trees in fileutils module 678920 - CVE-2011-1005 Ruby: Untrusted codes able to modify arbitrary strings 682332 - CVE-2011-0188 ruby: memory corruption in BigDecimal on 64bit platforms
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm
i386: ruby-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-irb-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm
x86_64: ruby-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm
i386: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-docs-1.8.7.299-7.el6_1.1.i686.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.i686.rpm ruby-ri-1.8.7.299-7.el6_1.1.i686.rpm ruby-static-1.8.7.299-7.el6_1.1.i686.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.i686.rpm
x86_64: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm
x86_64: ruby-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm
i386: ruby-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-irb-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm
ppc64: ruby-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.ppc.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-irb-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-libs-1.8.7.299-7.el6_1.1.ppc.rpm ruby-libs-1.8.7.299-7.el6_1.1.ppc64.rpm
s390x: ruby-1.8.7.299-7.el6_1.1.s390x.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.s390.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.s390x.rpm ruby-irb-1.8.7.299-7.el6_1.1.s390x.rpm ruby-libs-1.8.7.299-7.el6_1.1.s390.rpm ruby-libs-1.8.7.299-7.el6_1.1.s390x.rpm
x86_64: ruby-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm
i386: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-docs-1.8.7.299-7.el6_1.1.i686.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.i686.rpm ruby-ri-1.8.7.299-7.el6_1.1.i686.rpm ruby-static-1.8.7.299-7.el6_1.1.i686.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.i686.rpm
ppc64: ruby-debuginfo-1.8.7.299-7.el6_1.1.ppc.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-devel-1.8.7.299-7.el6_1.1.ppc.rpm ruby-devel-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-docs-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-ri-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-static-1.8.7.299-7.el6_1.1.ppc64.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.ppc64.rpm
s390x: ruby-debuginfo-1.8.7.299-7.el6_1.1.s390.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.s390x.rpm ruby-devel-1.8.7.299-7.el6_1.1.s390.rpm ruby-devel-1.8.7.299-7.el6_1.1.s390x.rpm ruby-docs-1.8.7.299-7.el6_1.1.s390x.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.s390x.rpm ruby-ri-1.8.7.299-7.el6_1.1.s390x.rpm ruby-static-1.8.7.299-7.el6_1.1.s390x.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.s390x.rpm
x86_64: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm
i386: ruby-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-irb-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm
x86_64: ruby-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-libs-1.8.7.299-7.el6_1.1.i686.rpm ruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm
i386: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-docs-1.8.7.299-7.el6_1.1.i686.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.i686.rpm ruby-ri-1.8.7.299-7.el6_1.1.i686.rpm ruby-static-1.8.7.299-7.el6_1.1.i686.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.i686.rpm
x86_64: ruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm ruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-devel-1.8.7.299-7.el6_1.1.i686.rpm ruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm ruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-0188.html https://www.redhat.com/security/data/cve/CVE-2011-1004.html https://www.redhat.com/security/data/cve/CVE-2011-1005.html https://access.redhat.com/security/updates/classification/#moderate http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/ http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFOChFrXlSAg2UNWIIRAqVDAKC4AQkDB5prIP2m6NnD6qfX0sYGkACeOH7K 8UV4ULTNCtKEbwxTKay8Ilk= =Nsw7 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ----------------------------------------------------------------------
http://twitter.com/secunia
http://www.facebook.com/Secunia
TITLE: Ruby BigDecimal Integer Truncation Vulnerability
SECUNIA ADVISORY ID: SA44638
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44638/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44638
RELEASE DATE: 2011-05-25
DISCUSS ADVISORY: http://secunia.com/advisories/44638/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/44638/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44638
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in Ruby, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
The vulnerability is caused due to an integer truncation vulnerability within the "VpMemAlloc()" function in ext/bigdecimal/bigdecimal.c, which can be exploited to e.g. cause a memory corruption.
SOLUTION: Fixed in the SVN repository.
Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY: The vendor credits Drew Yao, Apple Product Security
ORIGINAL ADVISORY: https://bugzilla.redhat.com/show_bug.cgi?id=682332 http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=30993
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. Content-Disposition: inline
============================================================================ Ubuntu Security Notice USN-1377-1 February 28, 2012
ruby1.8 vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in ruby1.8.
Software Description: - ruby1.8: Interpreter of object-oriented scripting language Ruby 1.8
Details:
Drew Yao discovered that the WEBrick HTTP server was vulnerable to cross-site scripting attacks when displaying error pages. (CVE-2010-0541)
Drew Yao discovered that Ruby's BigDecimal module did not properly allocate memory on 64-bit platforms. (CVE-2011-0188)
Nicholas Jefferson discovered that the FileUtils.remove_entry_secure method in Ruby did not properly remove non-empty directories. (CVE-2011-1004)
It was discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. (CVE-2011-1005)
Eric Wong discovered that Ruby does not properly reseed its pseudorandom number generator when creating child processes. An attacker could use this flaw to gain knowledge of the random numbers used in other Ruby child processes. (CVE-2011-2686)
Eric Wong discovered that the SecureRandom module in Ruby did not properly seed its pseudorandom number generator. An attacker could use this flaw to gain knowledge of the random numbers used by another Ruby process with the same process ID number. (CVE-2011-2705)
Alexander Klink and Julian W=E4lde discovered that Ruby computed hash values without restricting the ability to trigger hash collisions predictably. A remote attacker could cause a denial of service by crafting values used in hash tables. (CVE-2011-4815)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 11.10: libruby1.8 1.8.7.352-2ubuntu0.1 ruby1.8 1.8.7.352-2ubuntu0.1
Ubuntu 11.04: libruby1.8 1.8.7.302-2ubuntu0.1 ruby1.8 1.8.7.302-2ubuntu0.1
Ubuntu 10.10: libruby1.8 1.8.7.299-2ubuntu0.1 ruby1.8 1.8.7.299-2ubuntu0.1
Ubuntu 10.04 LTS: libruby1.8 1.8.7.249-2ubuntu0.1 ruby1.8 1.8.7.249-2ubuntu0.1
In general, a standard system update will make all the necessary changes
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201103-0287",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ruby",
"scope": "lte",
"trust": 1.8,
"vendor": "ruby lang",
"version": "1.9.2-p136"
},
{
"model": "ruby",
"scope": "eq",
"trust": 1.6,
"vendor": "ruby lang",
"version": "1.9.0-20070709"
},
{
"model": "ruby",
"scope": "eq",
"trust": 1.6,
"vendor": "ruby lang",
"version": "1.9.0-2"
},
{
"model": "ruby",
"scope": "eq",
"trust": 1.6,
"vendor": "ruby lang",
"version": "1.9.2"
},
{
"model": "ruby",
"scope": "eq",
"trust": 1.6,
"vendor": "ruby lang",
"version": "1.9.1"
},
{
"model": "ruby",
"scope": "eq",
"trust": 1.6,
"vendor": "ruby lang",
"version": "1.9.0-1"
},
{
"model": "ruby",
"scope": "eq",
"trust": 1.6,
"vendor": "ruby lang",
"version": "1.9.0-20060415"
},
{
"model": "ruby",
"scope": "eq",
"trust": 1.6,
"vendor": "ruby lang",
"version": "1.9.0"
},
{
"model": "ruby",
"scope": "eq",
"trust": 1.0,
"vendor": "ruby lang",
"version": "1.9"
},
{
"model": "ruby",
"scope": "eq",
"trust": 1.0,
"vendor": "ruby lang",
"version": "1.9.0-0"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5.8"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.6 to v10.6.6"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5.8"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.6 to v10.6.6"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86-64)"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0"
},
{
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0 (x86-64)"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "6"
},
{
"model": "enterprise linux hpc node",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "6"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "6"
},
{
"model": "enterprise linux server eus",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "6.1.z"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "6"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9-1"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.10"
},
{
"model": "hat enterprise linux eus 5.6.z server",
"scope": null,
"trust": 0.3,
"vendor": "red",
"version": null
},
{
"model": "matsumoto ruby 1.8.7-p302",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "matsumoto ruby 1.8.6-p383",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.6"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.0-3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.6"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"model": "matsumoto ruby -rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.2"
},
{
"model": "hat enterprise linux long life server",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5.6"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.6.8"
},
{
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "matsumoto ruby p180",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.2"
},
{
"model": "enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.7"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.2"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.2"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.10"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.10"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"model": "matsumoto ruby -p376",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.1"
},
{
"model": "matsumoto ruby pre4",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.2"
},
{
"model": "matsumoto ruby 1.8.7-p173",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.4"
},
{
"model": "matsumoto ruby 1.8.6-p368",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "matsumoto ruby pre3",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.2"
},
{
"model": "hat enterprise linux as 4.8.z",
"scope": null,
"trust": 0.3,
"vendor": "red",
"version": null
},
{
"model": "matsumoto ruby 1.8.7-p334",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.1"
},
{
"model": "hat enterprise linux desktop client",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"model": "matsumoto ruby -p71",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.7"
},
{
"model": "matsumoto ruby 1.8.7-p299",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6"
},
{
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.5"
},
{
"model": "matsumoto ruby -p72",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.7"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.04"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.1"
},
{
"model": "matsumoto ruby 1.8.7-p330",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "hat enterprise linux hpc node",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.3"
},
{
"model": "matsumoto ruby p0",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.2"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.6.7"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.6"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.8"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.10"
},
{
"model": "matsumoto ruby -p429",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.5"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2009.0"
},
{
"model": "matsumoto ruby 1.8.7-p249",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.04"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.3"
},
{
"model": "matsumoto ruby 1.9.1-p430",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.10"
},
{
"model": "hat enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "matsumoto ruby -p229",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.3"
},
{
"model": "matsumoto ruby -p115",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.5"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.2"
},
{
"model": "matsumoto ruby -p286",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "matsumoto ruby -p230",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.5"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.10"
},
{
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "matsumoto ruby 1.8.6-p399",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.6"
},
{
"model": "matsumoto ruby -p22",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.7"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2010.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"model": "matsumoto ruby 1.8.6-p388",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "matsumoto ruby -p230",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "hat enterprise linux workstation",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "matsumoto ruby 1.8.6-p369",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.2"
},
{
"model": "matsumoto ruby -p114",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.04"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.7"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "11.04"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.4"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6"
},
{
"model": "matsumoto ruby 1.8.7-p248",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "matsumoto ruby p136",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.2"
},
{
"model": "matsumoto ruby -p2",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.5"
},
{
"model": "hat enterprise linux server eus 6.1.z",
"scope": null,
"trust": 0.3,
"vendor": "red",
"version": null
},
{
"model": "aura system manager sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.1"
},
{
"model": "matsumoto ruby -p287",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.6"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9-2"
},
{
"model": "matsumoto ruby 1.8.7-p160",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.5"
},
{
"model": "hat enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.1"
},
{
"model": "enterprise linux es 4.8.z",
"scope": null,
"trust": 0.3,
"vendor": "redhat",
"version": null
},
{
"model": "aura system manager sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.8"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.7"
},
{
"model": "matsumoto ruby pre2",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.2"
},
{
"model": "hat desktop workstation",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"model": "matsumoto ruby 1.8.6-p420",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "enterprise server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "matsumoto ruby pre3",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.2"
},
{
"model": "hat enterprise linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"model": "matsumoto ruby rc2",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.2"
},
{
"model": "matsumoto ruby",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "0"
},
{
"model": "matsumoto ruby p431",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.9.1"
},
{
"model": "matsumoto ruby -p231",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.5"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2009.0"
},
{
"model": "hat enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "4"
},
{
"model": "mac os server",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.7"
},
{
"model": "matsumoto ruby -p21",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.7"
},
{
"model": "matsumoto ruby 1.9.1-p378",
"scope": null,
"trust": 0.3,
"vendor": "yukihiro",
"version": null
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2010.1"
},
{
"model": "matsumoto ruby pre1",
"scope": "eq",
"trust": 0.3,
"vendor": "yukihiro",
"version": "1.8.2"
}
],
"sources": [
{
"db": "BID",
"id": "46966"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001413"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-298"
},
{
"db": "NVD",
"id": "CVE-2011-0188"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.9.2-p136",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.2:dev:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0188"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Drew Yao",
"sources": [
{
"db": "BID",
"id": "46966"
}
],
"trust": 0.3
},
"cve": "CVE-2011-0188",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2011-0188",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-48133",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2011-0188",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201103-298",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-48133",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48133"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001413"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-298"
},
{
"db": "NVD",
"id": "CVE-2011-0188"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\". Ruby is prone to a remote code-execution vulnerability because it fails to properly sanitize user-supplied input. \nA successful exploit can allow an attacker to execute arbitrary code in the context of the application. Failed exploit attempts will result in a denial-of-service condition. \nRuby 1.9.2 is vulnerable; other versions may also be affected. \nNOTE: This issue was previously described in BID 46950 (Apple Mac OS X Prior to 10.6.7 Multiple Security Vulnerabilities) but has been given its own record to better document it. Apple Mac OS X is a dedicated operating system developed by Apple for Mac computers. \n \n The safe-level feature in Ruby allows context-dependent attackers\n to modify strings via the Exception#to_s method, as demonstrated by\n changing an intended pathname (CVE-2011-1005). (CVE-2011-0188). The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFN2kOHmqjQ0CJFipgRAjT0AKCi4//MacXhajM4lSZ24BbA8dHPkwCgsYXk\nieo0ut/wYOOUFl6E8bWk+gA=\n=S8F9\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n(CVE-2011-1004)\n\nIt was found that WEBrick (the Ruby HTTP server toolkit) did not filter\nterminal escape sequences from its log files. A remote attacker could use\nspecially-crafted HTTP requests to inject terminal escape sequences into\nthe WEBrick log files. If a victim viewed the log files with a terminal\nemulator, it could result in control characters being executed with the\nprivileges of that user. (CVE-2009-4492)\n\nA cross-site scripting (XSS) flaw was found in the way WEBrick displayed\nerror pages. A remote attacker could use this flaw to perform a cross-site\nscripting attack against victims by tricking them into visiting a\nspecially-crafted URL. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201412-27\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Ruby: Denial of Service\n Date: December 13, 2014\n Bugs: #355439, #369141, #396301, #437366, #442580, #458776,\n #492282, #527084, #529216\n ID: 201412-27\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Ruby, allowing\ncontext-dependent attackers to cause a Denial of Service condition. Please review\nthe CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Ruby 1.9 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-lang/ruby-1.9.3_p551\"\n\nAll Ruby 2.0 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-lang/ruby-2.0.0_p598\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-0188\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0188\n[ 2 ] CVE-2011-1004\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1004\n[ 3 ] CVE-2011-1005\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1005\n[ 4 ] CVE-2011-4815\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4815\n[ 5 ] CVE-2012-4481\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4481\n[ 6 ] CVE-2012-5371\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5371\n[ 7 ] CVE-2013-0269\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0269\n[ 8 ] CVE-2013-1821\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1821\n[ 9 ] CVE-2013-4164\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4164\n[ 10 ] CVE-2014-8080\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8080\n[ 11 ] CVE-2014-8090\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8090\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201412-27.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2014 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: ruby security update\nAdvisory ID: RHSA-2011:0910-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2011-0910.html\nIssue date: 2011-06-28\nCVE Names: CVE-2011-0188 CVE-2011-1004 CVE-2011-1005 \n=====================================================================\n\n1. Summary:\n\nUpdated ruby packages that fix three security issues are now available for\nRed Hat Enterprise Linux 6. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64\n\n3. Description:\n\nRuby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks. \n\nA flaw was found in the way large amounts of memory were allocated on\n64-bit systems when using the BigDecimal class. This issue did not affect 32-bit systems. (CVE-2011-0188)\n\nA race condition flaw was found in the remove system entries method in the\nFileUtils module. If a local user ran a Ruby script that uses this method,\na local attacker could use this flaw to delete arbitrary files and\ndirectories accessible to that user via a symbolic link attack. \n(CVE-2011-1004)\n\nA flaw was found in the method for translating an exception message into a\nstring in the Exception class. A remote attacker could use this flaw to\nbypass safe level 4 restrictions, allowing untrusted (tainted) code to\nmodify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2011-1005)\n\nRed Hat would like to thank Drew Yao of Apple Product Security for\nreporting the CVE-2011-0188 issue. \n\nAll Ruby users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n678913 - CVE-2011-1004 Ruby: Symlink race condition by removing directory trees in fileutils module\n678920 - CVE-2011-1005 Ruby: Untrusted codes able to modify arbitrary strings\n682332 - CVE-2011-0188 ruby: memory corruption in BigDecimal on 64bit platforms\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm\n\ni386:\nruby-1.8.7.299-7.el6_1.1.i686.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-irb-1.8.7.299-7.el6_1.1.i686.rpm\nruby-libs-1.8.7.299-7.el6_1.1.i686.rpm\n\nx86_64:\nruby-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-libs-1.8.7.299-7.el6_1.1.i686.rpm\nruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm\n\ni386:\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-devel-1.8.7.299-7.el6_1.1.i686.rpm\nruby-docs-1.8.7.299-7.el6_1.1.i686.rpm\nruby-rdoc-1.8.7.299-7.el6_1.1.i686.rpm\nruby-ri-1.8.7.299-7.el6_1.1.i686.rpm\nruby-static-1.8.7.299-7.el6_1.1.i686.rpm\nruby-tcltk-1.8.7.299-7.el6_1.1.i686.rpm\n\nx86_64:\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-devel-1.8.7.299-7.el6_1.1.i686.rpm\nruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm\n\nx86_64:\nruby-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-devel-1.8.7.299-7.el6_1.1.i686.rpm\nruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-libs-1.8.7.299-7.el6_1.1.i686.rpm\nruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm\n\ni386:\nruby-1.8.7.299-7.el6_1.1.i686.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-irb-1.8.7.299-7.el6_1.1.i686.rpm\nruby-libs-1.8.7.299-7.el6_1.1.i686.rpm\n\nppc64:\nruby-1.8.7.299-7.el6_1.1.ppc64.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.ppc.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.ppc64.rpm\nruby-irb-1.8.7.299-7.el6_1.1.ppc64.rpm\nruby-libs-1.8.7.299-7.el6_1.1.ppc.rpm\nruby-libs-1.8.7.299-7.el6_1.1.ppc64.rpm\n\ns390x:\nruby-1.8.7.299-7.el6_1.1.s390x.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.s390.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.s390x.rpm\nruby-irb-1.8.7.299-7.el6_1.1.s390x.rpm\nruby-libs-1.8.7.299-7.el6_1.1.s390.rpm\nruby-libs-1.8.7.299-7.el6_1.1.s390x.rpm\n\nx86_64:\nruby-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-libs-1.8.7.299-7.el6_1.1.i686.rpm\nruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm\n\ni386:\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-devel-1.8.7.299-7.el6_1.1.i686.rpm\nruby-docs-1.8.7.299-7.el6_1.1.i686.rpm\nruby-rdoc-1.8.7.299-7.el6_1.1.i686.rpm\nruby-ri-1.8.7.299-7.el6_1.1.i686.rpm\nruby-static-1.8.7.299-7.el6_1.1.i686.rpm\nruby-tcltk-1.8.7.299-7.el6_1.1.i686.rpm\n\nppc64:\nruby-debuginfo-1.8.7.299-7.el6_1.1.ppc.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.ppc64.rpm\nruby-devel-1.8.7.299-7.el6_1.1.ppc.rpm\nruby-devel-1.8.7.299-7.el6_1.1.ppc64.rpm\nruby-docs-1.8.7.299-7.el6_1.1.ppc64.rpm\nruby-rdoc-1.8.7.299-7.el6_1.1.ppc64.rpm\nruby-ri-1.8.7.299-7.el6_1.1.ppc64.rpm\nruby-static-1.8.7.299-7.el6_1.1.ppc64.rpm\nruby-tcltk-1.8.7.299-7.el6_1.1.ppc64.rpm\n\ns390x:\nruby-debuginfo-1.8.7.299-7.el6_1.1.s390.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.s390x.rpm\nruby-devel-1.8.7.299-7.el6_1.1.s390.rpm\nruby-devel-1.8.7.299-7.el6_1.1.s390x.rpm\nruby-docs-1.8.7.299-7.el6_1.1.s390x.rpm\nruby-rdoc-1.8.7.299-7.el6_1.1.s390x.rpm\nruby-ri-1.8.7.299-7.el6_1.1.s390x.rpm\nruby-static-1.8.7.299-7.el6_1.1.s390x.rpm\nruby-tcltk-1.8.7.299-7.el6_1.1.s390x.rpm\n\nx86_64:\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-devel-1.8.7.299-7.el6_1.1.i686.rpm\nruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm\n\ni386:\nruby-1.8.7.299-7.el6_1.1.i686.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-irb-1.8.7.299-7.el6_1.1.i686.rpm\nruby-libs-1.8.7.299-7.el6_1.1.i686.rpm\n\nx86_64:\nruby-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-irb-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-libs-1.8.7.299-7.el6_1.1.i686.rpm\nruby-libs-1.8.7.299-7.el6_1.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/ruby-1.8.7.299-7.el6_1.1.src.rpm\n\ni386:\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-devel-1.8.7.299-7.el6_1.1.i686.rpm\nruby-docs-1.8.7.299-7.el6_1.1.i686.rpm\nruby-rdoc-1.8.7.299-7.el6_1.1.i686.rpm\nruby-ri-1.8.7.299-7.el6_1.1.i686.rpm\nruby-static-1.8.7.299-7.el6_1.1.i686.rpm\nruby-tcltk-1.8.7.299-7.el6_1.1.i686.rpm\n\nx86_64:\nruby-debuginfo-1.8.7.299-7.el6_1.1.i686.rpm\nruby-debuginfo-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-devel-1.8.7.299-7.el6_1.1.i686.rpm\nruby-devel-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-docs-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-rdoc-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-ri-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-static-1.8.7.299-7.el6_1.1.x86_64.rpm\nruby-tcltk-1.8.7.299-7.el6_1.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-0188.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-1004.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-1005.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttp://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/\nhttp://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFOChFrXlSAg2UNWIIRAqVDAKC4AQkDB5prIP2m6NnD6qfX0sYGkACeOH7K\n8UV4ULTNCtKEbwxTKay8Ilk=\n=Nsw7\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ----------------------------------------------------------------------\n\n\nhttp://twitter.com/secunia\n\nhttp://www.facebook.com/Secunia\n\n\n----------------------------------------------------------------------\n\nTITLE:\nRuby BigDecimal Integer Truncation Vulnerability\n\nSECUNIA ADVISORY ID:\nSA44638\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/44638/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44638\n\nRELEASE DATE:\n2011-05-25\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/44638/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/44638/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44638\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Ruby, which can be exploited by\nmalicious people to cause a DoS (Denial of Service) and potentially\ncompromise a vulnerable system. \n\nThe vulnerability is caused due to an integer truncation\nvulnerability within the \"VpMemAlloc()\" function in\next/bigdecimal/bigdecimal.c, which can be exploited to e.g. cause a\nmemory corruption. \n\nSOLUTION:\nFixed in the SVN repository. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits Drew Yao, Apple Product Security\n\nORIGINAL ADVISORY:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=682332\nhttp://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=30993\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. Content-Disposition: inline\n\n\n============================================================================\nUbuntu Security Notice USN-1377-1\nFebruary 28, 2012\n\nruby1.8 vulnerabilities\n============================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 11.10\n- Ubuntu 11.04\n- Ubuntu 10.10\n- Ubuntu 10.04 LTS\n\nSummary:\n\nSeveral security issues were fixed in ruby1.8. \n\nSoftware Description:\n- ruby1.8: Interpreter of object-oriented scripting language Ruby 1.8\n\nDetails:\n\nDrew Yao discovered that the WEBrick HTTP server was vulnerable to cross-site\nscripting attacks when displaying error pages. (CVE-2010-0541)\n\nDrew Yao discovered that Ruby\u0027s BigDecimal module did not properly allocate\nmemory on 64-bit platforms. \n(CVE-2011-0188)\n\nNicholas Jefferson discovered that the FileUtils.remove_entry_secure method in\nRuby did not properly remove non-empty directories. (CVE-2011-1004)\n\nIt was discovered that Ruby incorrectly allowed untainted strings to be\nmodified in protective safe levels. (CVE-2011-1005)\n\nEric Wong discovered that Ruby does not properly reseed its pseudorandom number\ngenerator when creating child processes. An attacker could use this flaw to\ngain knowledge of the random numbers used in other Ruby child processes. \n(CVE-2011-2686)\n\nEric Wong discovered that the SecureRandom module in Ruby did not properly seed\nits pseudorandom number generator. An attacker could use this flaw to gain\nknowledge of the random numbers used by another Ruby process with the same\nprocess ID number. (CVE-2011-2705)\n\nAlexander Klink and Julian W=E4lde discovered that Ruby computed hash values\nwithout restricting the ability to trigger hash collisions predictably. A\nremote attacker could cause a denial of service by crafting values used in hash\ntables. (CVE-2011-4815)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 11.10:\n libruby1.8 1.8.7.352-2ubuntu0.1\n ruby1.8 1.8.7.352-2ubuntu0.1\n\nUbuntu 11.04:\n libruby1.8 1.8.7.302-2ubuntu0.1\n ruby1.8 1.8.7.302-2ubuntu0.1\n\nUbuntu 10.10:\n libruby1.8 1.8.7.299-2ubuntu0.1\n ruby1.8 1.8.7.299-2ubuntu0.1\n\nUbuntu 10.04 LTS:\n libruby1.8 1.8.7.249-2ubuntu0.1\n ruby1.8 1.8.7.249-2ubuntu0.1\n\nIn general, a standard system update will make all the necessary changes",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0188"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001413"
},
{
"db": "BID",
"id": "46966"
},
{
"db": "VULHUB",
"id": "VHN-48133"
},
{
"db": "PACKETSTORM",
"id": "101616"
},
{
"db": "PACKETSTORM",
"id": "102622"
},
{
"db": "PACKETSTORM",
"id": "129551"
},
{
"db": "PACKETSTORM",
"id": "102628"
},
{
"db": "PACKETSTORM",
"id": "102620"
},
{
"db": "PACKETSTORM",
"id": "101648"
},
{
"db": "PACKETSTORM",
"id": "110262"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2011-0188",
"trust": 3.4
},
{
"db": "SECTRACK",
"id": "1025236",
"trust": 1.9
},
{
"db": "BID",
"id": "46966",
"trust": 1.2
},
{
"db": "SECUNIA",
"id": "44638",
"trust": 0.9
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001413",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201103-298",
"trust": 0.7
},
{
"db": "NSFOCUS",
"id": "16613",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "16871",
"trust": 0.6
},
{
"db": "SECUNIA",
"id": "43814",
"trust": 0.6
},
{
"db": "APPLE",
"id": "APPLE-SA-2011-03-21-1",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "129551",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "102628",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-48133",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "101616",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "102622",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "102620",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "101648",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "110262",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48133"
},
{
"db": "BID",
"id": "46966"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001413"
},
{
"db": "PACKETSTORM",
"id": "101616"
},
{
"db": "PACKETSTORM",
"id": "102622"
},
{
"db": "PACKETSTORM",
"id": "129551"
},
{
"db": "PACKETSTORM",
"id": "102628"
},
{
"db": "PACKETSTORM",
"id": "102620"
},
{
"db": "PACKETSTORM",
"id": "101648"
},
{
"db": "PACKETSTORM",
"id": "110262"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-298"
},
{
"db": "NVD",
"id": "CVE-2011-0188"
}
]
},
"id": "VAR-201103-0287",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-48133"
}
],
"trust": 0.01
},
"last_update_date": "2024-07-23T19:54:23.870000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HT4581",
"trust": 0.8,
"url": "http://support.apple.com/kb/ht4581"
},
{
"title": "HT4581",
"trust": 0.8,
"url": "http://support.apple.com/kb/ht4581?viewlocale=ja_jp"
},
{
"title": "ruby-1.8.5-19.1.0.1.AXS3",
"trust": 0.8,
"url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1463"
},
{
"title": "2225",
"trust": 0.8,
"url": "https://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=2225"
},
{
"title": "RHSA-2011:0910",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/rhsa-2011-0910.html"
},
{
"title": "Ruby 1.9.2-p136\u30ea\u30ea\u30fc\u30b9",
"trust": 0.8,
"url": "http://www.ruby-lang.org/ja/news/2010/12/25/ruby-1-9-2-p136-is-released"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-001413"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-189",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48133"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001413"
},
{
"db": "NVD",
"id": "CVE-2011-0188"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "http://www.securitytracker.com/id?1025236"
},
{
"trust": 1.8,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2011/mar/msg00006.html"
},
{
"trust": 1.7,
"url": "http://support.apple.com/kb/ht4581"
},
{
"trust": 1.6,
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993"
},
{
"trust": 1.1,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:097"
},
{
"trust": 1.1,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:098"
},
{
"trust": 1.1,
"url": "http://www.redhat.com/support/errata/rhsa-2011-0908.html"
},
{
"trust": 1.1,
"url": "http://www.redhat.com/support/errata/rhsa-2011-0909.html"
},
{
"trust": 1.1,
"url": "http://www.redhat.com/support/errata/rhsa-2011-0910.html"
},
{
"trust": 0.9,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0188"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu636925"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0188"
},
{
"trust": 0.8,
"url": "http://secunia.com/advisories/44638"
},
{
"trust": 0.8,
"url": "http://www.securityfocus.com/bid/46966"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-0188"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1005"
},
{
"trust": 0.6,
"url": "http://secunia.com/advisories/43814"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/16613"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/16871"
},
{
"trust": 0.4,
"url": "http://rhn.redhat.com/errata/rhsa-2011-0908.html"
},
{
"trust": 0.4,
"url": "http://rhn.redhat.com/errata/rhsa-2011-0909.html"
},
{
"trust": 0.4,
"url": "http://rhn.redhat.com/errata/rhsa-2011-0910.html"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-0541"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-1004"
},
{
"trust": 0.3,
"url": "http://www.apple.com/macosx/"
},
{
"trust": 0.3,
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?annotate=30993\u0026diff_format=h"
},
{
"trust": 0.3,
"url": "http://www.ruby-lang.org"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/css/p8/documents/100144502"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/kb/docs/doc-11259"
},
{
"trust": 0.3,
"url": "https://www.redhat.com/security/data/cve/cve-2011-1005.html"
},
{
"trust": 0.3,
"url": "https://www.redhat.com/security/data/cve/cve-2011-0188.html"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.3,
"url": "http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/"
},
{
"trust": 0.3,
"url": "https://www.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/team/key/#package"
},
{
"trust": 0.3,
"url": "http://bugzilla.redhat.com/):"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2010-0541.html"
},
{
"trust": 0.2,
"url": "http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-4492"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2009-4492.html"
},
{
"trust": 0.2,
"url": "https://www.redhat.com/security/data/cve/cve-2011-1004.html"
},
{
"trust": 0.2,
"url": "http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/"
},
{
"trust": 0.2,
"url": "http://www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-4815"
},
{
"trust": 0.1,
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026amp;r2=30993"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0541"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1005"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.1,
"url": "http://secunia.com/"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/advisories"
},
{
"trust": 0.1,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4815"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5371"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1005"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-0269"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1821"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8080"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-8080"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0188"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0269"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-5371"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-4164"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-8090"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-1004"
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4164"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2012-4481"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/glsa/glsa-201412-27.xml"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-8090"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2013-1821"
},
{
"trust": 0.1,
"url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4481"
},
{
"trust": 0.1,
"url": "https://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44638"
},
{
"trust": 0.1,
"url": "http://twitter.com/secunia"
},
{
"trust": 0.1,
"url": "http://secunia.com/products/corporate/evm/"
},
{
"trust": 0.1,
"url": "http://www.facebook.com/secunia"
},
{
"trust": 0.1,
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=30993"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/44638/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/44638/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.302-2ubuntu0.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.299-2ubuntu0.1"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2705"
},
{
"trust": 0.1,
"url": "http://www.ubuntu.com/usn/usn-1377-1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.249-2ubuntu0.1"
},
{
"trust": 0.1,
"url": "https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.352-2ubuntu0.1"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2011-2686"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48133"
},
{
"db": "BID",
"id": "46966"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001413"
},
{
"db": "PACKETSTORM",
"id": "101616"
},
{
"db": "PACKETSTORM",
"id": "102622"
},
{
"db": "PACKETSTORM",
"id": "129551"
},
{
"db": "PACKETSTORM",
"id": "102628"
},
{
"db": "PACKETSTORM",
"id": "102620"
},
{
"db": "PACKETSTORM",
"id": "101648"
},
{
"db": "PACKETSTORM",
"id": "110262"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-298"
},
{
"db": "NVD",
"id": "CVE-2011-0188"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-48133"
},
{
"db": "BID",
"id": "46966"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001413"
},
{
"db": "PACKETSTORM",
"id": "101616"
},
{
"db": "PACKETSTORM",
"id": "102622"
},
{
"db": "PACKETSTORM",
"id": "129551"
},
{
"db": "PACKETSTORM",
"id": "102628"
},
{
"db": "PACKETSTORM",
"id": "102620"
},
{
"db": "PACKETSTORM",
"id": "101648"
},
{
"db": "PACKETSTORM",
"id": "110262"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-298"
},
{
"db": "NVD",
"id": "CVE-2011-0188"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-03-23T00:00:00",
"db": "VULHUB",
"id": "VHN-48133"
},
{
"date": "2011-03-21T00:00:00",
"db": "BID",
"id": "46966"
},
{
"date": "2011-04-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-001413"
},
{
"date": "2011-05-23T14:35:38",
"db": "PACKETSTORM",
"id": "101616"
},
{
"date": "2011-06-28T19:16:10",
"db": "PACKETSTORM",
"id": "102622"
},
{
"date": "2014-12-15T19:58:46",
"db": "PACKETSTORM",
"id": "129551"
},
{
"date": "2011-06-28T19:32:00",
"db": "PACKETSTORM",
"id": "102628"
},
{
"date": "2011-06-28T19:11:19",
"db": "PACKETSTORM",
"id": "102620"
},
{
"date": "2011-05-24T05:21:29",
"db": "PACKETSTORM",
"id": "101648"
},
{
"date": "2012-02-28T07:00:01",
"db": "PACKETSTORM",
"id": "110262"
},
{
"date": "2011-03-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201103-298"
},
{
"date": "2011-03-23T02:00:06.110000",
"db": "NVD",
"id": "CVE-2011-0188"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-08-24T00:00:00",
"db": "VULHUB",
"id": "VHN-48133"
},
{
"date": "2015-03-19T08:18:00",
"db": "BID",
"id": "46966"
},
{
"date": "2011-07-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-001413"
},
{
"date": "2021-07-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201103-298"
},
{
"date": "2011-08-24T03:15:07.243000",
"db": "NVD",
"id": "CVE-2011-0188"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "101616"
},
{
"db": "PACKETSTORM",
"id": "102620"
},
{
"db": "PACKETSTORM",
"id": "110262"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-298"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Ruby of BigDecimal In class VpMemAlloc Vulnerability in arbitrary code execution in function",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-001413"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201103-298"
}
],
"trust": 0.6
}
}
FKIE_CVE-2011-0188
Vulnerability from fkie_nvd - Published: 2011-03-23 02:00 - Updated: 2026-04-29 01:13| Vendor | Product | Version | |
|---|---|---|---|
| ruby-lang | ruby | * | |
| ruby-lang | ruby | 1.9 | |
| ruby-lang | ruby | 1.9 | |
| ruby-lang | ruby | 1.9.0 | |
| ruby-lang | ruby | 1.9.0 | |
| ruby-lang | ruby | 1.9.0-0 | |
| ruby-lang | ruby | 1.9.0-1 | |
| ruby-lang | ruby | 1.9.0-2 | |
| ruby-lang | ruby | 1.9.0-20060415 | |
| ruby-lang | ruby | 1.9.0-20070709 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.2 | |
| ruby-lang | ruby | 1.9.2 | |
| apple | mac_os_x | 10.5.8 | |
| apple | mac_os_x | 10.6.0 | |
| apple | mac_os_x | 10.6.1 | |
| apple | mac_os_x | 10.6.2 | |
| apple | mac_os_x | 10.6.3 | |
| apple | mac_os_x | 10.6.4 | |
| apple | mac_os_x | 10.6.5 | |
| apple | mac_os_x | 10.6.6 | |
| apple | mac_os_x_server | 10.5.8 | |
| apple | mac_os_x_server | 10.6.0 | |
| apple | mac_os_x_server | 10.6.1 | |
| apple | mac_os_x_server | 10.6.2 | |
| apple | mac_os_x_server | 10.6.3 | |
| apple | mac_os_x_server | 10.6.4 | |
| apple | mac_os_x_server | 10.6.5 | |
| apple | mac_os_x_server | 10.6.6 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7999259C-95F6-474B-A828-1DEBFD20236D",
"versionEndIncluding": "1.9.2-p136",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D9237145-35F8-4E05-B730-77C0F386E5B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9:r18423:*:*:*:*:*:*",
"matchCriteriaId": "11743FC1-0DD5-4946-AECF-C9962BF7C21F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52179EC7-CAF0-42AA-A21A-7105E10CA122",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.0:r18423:*:*:*:*:*:*",
"matchCriteriaId": "D906EA97-7071-4CFA-84EF-EC82D813D7AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.0-0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2D5127F-1E79-4F83-8BB0-C479B6CFE9AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.0-1:*:*:*:*:*:*:*",
"matchCriteriaId": "31181BA2-71A7-40C8-9E08-8FEAB013977B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.0-2:*:*:*:*:*:*:*",
"matchCriteriaId": "EB8F3772-C973-41DB-AB3A-F4323418FC7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.0-20060415:*:*:*:*:*:*:*",
"matchCriteriaId": "A688B357-7096-4362-A7DD-5A24FB0AF431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.0-20070709:*:*:*:*:*:*:*",
"matchCriteriaId": "46913DE9-8AE6-40E5-AEA1-6D2524EE7581",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C78BB1D8-0505-484D-B824-1AA219F8B247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p0:*:*:*:*:*:*",
"matchCriteriaId": "470CF526-96F6-4DD1-B687-17106051A6D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p129:*:*:*:*:*:*",
"matchCriteriaId": "52159D9F-8CD3-4103-82E6-BDE035BA3625",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p243:*:*:*:*:*:*",
"matchCriteriaId": "EC0FD3F8-73A3-4518-8892-1E34D709FB89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p376:*:*:*:*:*:*",
"matchCriteriaId": "4B846CCE-7D1D-4A7E-95D8-50F92CF79AC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-p429:*:*:*:*:*:*",
"matchCriteriaId": "CB99DD31-7355-4FF1-AE41-CC156F83D7A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_1:*:*:*:*:*:*",
"matchCriteriaId": "A7E15263-74D3-42D4-B37C-C649F68EDECC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-preview_2:*:*:*:*:*:*",
"matchCriteriaId": "BA7FEA9B-06CE-4D08-9D61-2526ED5AE630",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc1:*:*:*:*:*:*",
"matchCriteriaId": "0D7F7EA5-7F6C-4C15-AB97-024836DC4862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:-rc2:*:*:*:*:*:*",
"matchCriteriaId": "236B38D1-0CCA-43C5-B2FC-1224F4F4E165",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5178D04D-1C29-4353-8987-559AA07443EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.2:dev:*:*:*:*:*:*",
"matchCriteriaId": "D19F541D-98C2-42A6-9364-D6D9A279796E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1335E35A-D381-4056-9E78-37BC6DF8AD98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C69DEE9-3FA5-408E-AD27-F5E7043F852A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D25D1FD3-C291-492C-83A7-0AFAFAADC98D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5B565F77-C310-4B83-B098-22F9489C226C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "546EBFC8-79F0-42C2-9B9A-A76CA3F19470",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "119C8089-8C98-472E-9E9C-1741AA21DD35",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "831C5105-6409-4743-8FB5-A91D8956202F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0B63D169-E2AA-4315-891F-B4AF99F2753C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "82B4CD59-9F37-4EF0-BA43-427CFD6E1329",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "26E34E35-CCE9-42BE-9AFF-561D8AA90E25",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A04FF6EE-D4DA-4D70-B0CE-154292828531",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9425320F-D119-49EB-9265-3159070DFE93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F6BE138D-619B-4E44-BFB2-8DFE5F0D1E12",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EF0D1051-F850-4A02-ABA0-968E1336A518",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C9705A-74D4-43BA-A119-C667678F9A15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4BBF5FE5-4B25-47BE-8D9D-F228746408EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an \"integer truncation issue.\""
},
{
"lang": "es",
"value": "La funci\u00f3n VpMemAlloc en bigdecimal.c en la clase BigDecimal en Ruby v1.9.2-P136 y anteriores, tal como se utiliza en Apple Mac OS X antes de vv10.6.7 y en otras plataformas, no asigna memoria adecuadamente, lo que permite a atacantes dependientes de contexto ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de vectores que impliquen la creaci\u00f3n de un valor BigDecimal grande dentro de un proceso de 64 bits, relacionado con un \"fallo de truncado de entero\"."
}
],
"evaluatorImpact": "Per: http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html\r\n\r\n \u0027This issue only affects 64-bit Ruby processes\u0027.",
"id": "CVE-2011-0188",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-03-23T02:00:06.110",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"source": "product-security@apple.com",
"tags": [
"Patch"
],
"url": "http://support.apple.com/kb/HT4581"
},
{
"source": "product-security@apple.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993"
},
{
"source": "product-security@apple.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"source": "product-security@apple.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"source": "product-security@apple.com",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"source": "product-security@apple.com",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"source": "product-security@apple.com",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"source": "product-security@apple.com",
"url": "http://www.securitytracker.com/id?1025236"
},
{
"source": "product-security@apple.com",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://support.apple.com/kb/HT4581"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi/trunk/ext/bigdecimal/bigdecimal.c?r1=29364\u0026r2=30993"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:097"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:098"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0908.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0909.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2011-0910.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025236"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=682332"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.