Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-3655 (GCVE-0-2008-3655)
Vulnerability from cvelistv5 – Published: 2008-08-13 01:00 – Updated: 2024-08-07 09:45- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:45:18.972Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "31430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31430"
},
{
"name": "1020656",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1020656"
},
{
"name": "31697",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/31697"
},
{
"name": "USN-651-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/651-1/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3549"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264"
},
{
"name": "DSA-1652",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1652"
},
{
"name": "FEDORA-2008-8736",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html"
},
{
"name": "oval:org.mitre.oval:def:11602",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602"
},
{
"name": "35074",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35074"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm"
},
{
"name": "DSA-1651",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2008/dsa-1651"
},
{
"name": "ruby-safelevel-security-bypass(44369)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44369"
},
{
"name": "APPLE-SA-2009-05-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "RHSA-2008:0895",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0895.html"
},
{
"name": "30644",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30644"
},
{
"name": "RHSA-2008:0897",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0897.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"name": "32219",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32219"
},
{
"name": "TA09-133A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "32255",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32255"
},
{
"name": "ADV-2009-1297",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "20080831 rPSA-2008-0264-1 ruby",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/495884/100/0/threaded"
},
{
"name": "32371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32371"
},
{
"name": "32165",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32165"
},
{
"name": "GLSA-200812-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"name": "33178",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/33178"
},
{
"name": "ADV-2008-2334",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"name": "32372",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32372"
},
{
"name": "FEDORA-2008-8738",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"name": "32256",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/32256"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-08-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-11T19:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "31430",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31430"
},
{
"name": "1020656",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1020656"
},
{
"name": "31697",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/31697"
},
{
"name": "USN-651-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/651-1/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3549"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264"
},
{
"name": "DSA-1652",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1652"
},
{
"name": "FEDORA-2008-8736",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html"
},
{
"name": "oval:org.mitre.oval:def:11602",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602"
},
{
"name": "35074",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35074"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm"
},
{
"name": "DSA-1651",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2008/dsa-1651"
},
{
"name": "ruby-safelevel-security-bypass(44369)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44369"
},
{
"name": "APPLE-SA-2009-05-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "RHSA-2008:0895",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0895.html"
},
{
"name": "30644",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30644"
},
{
"name": "RHSA-2008:0897",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0897.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"name": "32219",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32219"
},
{
"name": "TA09-133A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "32255",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32255"
},
{
"name": "ADV-2009-1297",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "20080831 rPSA-2008-0264-1 ruby",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/495884/100/0/threaded"
},
{
"name": "32371",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32371"
},
{
"name": "32165",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32165"
},
{
"name": "GLSA-200812-17",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"name": "33178",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/33178"
},
{
"name": "ADV-2008-2334",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"name": "32372",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32372"
},
{
"name": "FEDORA-2008-8738",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"name": "32256",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/32256"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3655",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "31430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31430"
},
{
"name": "1020656",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020656"
},
{
"name": "31697",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31697"
},
{
"name": "USN-651-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/651-1/"
},
{
"name": "http://support.apple.com/kb/HT3549",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3549"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264"
},
{
"name": "DSA-1652",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1652"
},
{
"name": "FEDORA-2008-8736",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html"
},
{
"name": "oval:org.mitre.oval:def:11602",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602"
},
{
"name": "35074",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35074"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm"
},
{
"name": "DSA-1651",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1651"
},
{
"name": "ruby-safelevel-security-bypass(44369)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44369"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "RHSA-2008:0895",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0895.html"
},
{
"name": "30644",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30644"
},
{
"name": "RHSA-2008:0897",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0897.html"
},
{
"name": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/",
"refsource": "CONFIRM",
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"name": "32219",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32219"
},
{
"name": "TA09-133A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "32255",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32255"
},
{
"name": "ADV-2009-1297",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "20080831 rPSA-2008-0264-1 ruby",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495884/100/0/threaded"
},
{
"name": "32371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32371"
},
{
"name": "32165",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32165"
},
{
"name": "GLSA-200812-17",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"name": "33178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33178"
},
{
"name": "ADV-2008-2334",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"name": "32372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32372"
},
{
"name": "FEDORA-2008-8738",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"name": "32256",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32256"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-3655",
"datePublished": "2008-08-13T01:00:00.000Z",
"dateReserved": "2008-08-12T00:00:00.000Z",
"dateUpdated": "2024-08-07T09:45:18.972Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2008-3655",
"date": "2026-04-22",
"epss": "0.29733",
"percentile": "0.96646"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.8.5\", \"matchCriteriaId\": \"9721AB68-8002-4F85-98BC-0E6FDF7CDF6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46086C6A-9068-4959-BEE7-4D76BDEA3962\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16BDFA5C-35BE-4B7E-BD2D-C28B095F62E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31160797-6920-4BA1-B355-1CCD1FCDBFC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC306E85-66D8-4384-BBC3-92DC99C85FC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5675C37-39EF-41EF-9A53-3FCE4CF23820\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*\", \"matchCriteriaId\": \"39609530-0A81-481E-BDA4-5A98327EAD11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C19ADE91-4D9E-43ED-A605-E504B9090119\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*\", \"matchCriteriaId\": \"D89E3027-C2ED-4CC6-86F5-1B791576B6EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46F29ADA-E6DC-456F-9E63-C56C68EF7E5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*\", \"matchCriteriaId\": \"57B1C113-682E-4F7D-BCF0-E30C446C4AC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BAF9471-B532-4194-AB3C-5AA28432FF27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*\", \"matchCriteriaId\": \"51BE9728-A5FE-486A-8DB9-711E46243132\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AC1B910-C0FA-4943-92B1-597842E84015\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A78ECCA9-6F07-4A63-8BF7-8D40F2439552\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*\", \"matchCriteriaId\": \"14513719-4ED8-4EAB-B4D8-29849B868BA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*\", \"matchCriteriaId\": \"92E3814D-BEEA-4E46-9CED-9D8059727D14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA7D3F32-EFB7-4628-9328-36C6A306B399\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1A95E9F-AEC5-4AF9-B7D9-52DDDECB7E77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*\", \"matchCriteriaId\": \"9328DE73-420B-4280-85A4-ABEFC4679676\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F382FBD-6163-4A5B-AEB3-A15A843329F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4399121F-9BC7-4A67-8B0B-ED3B94A16D56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFE61EB9-2544-4E48-B313-63A99F4F5241\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6122187F-2371-429A-971B-419B4ACE8E18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A42425D-FF21-4863-B43D-EE100DBE6BD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*\", \"matchCriteriaId\": \"06512108-020D-4D71-8F60-6AA2052D7D35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2E152A5-F625-4061-AD8C-4CFA085B674F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*\", \"matchCriteriaId\": \"756F5247-658C-412C-ACBF-CBE987DF748A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"876B2575-4F81-4A70-9A88-9BEE44649626\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF02372D-FD0B-453F-821E-1E0BA7900711\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A6ED369-E564-4D4F-9E23-A8125194EAD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACC0DB90-C072-4BCB-9082-94394F547D35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D7ED62B-4D88-46A4-A0A3-BD37E66A5211\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*\", \"matchCriteriaId\": \"072A0C3C-9F47-4DC7-96EA-7980B45429DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB0372E4-FE3E-49CD-AF55-E2E4518D34F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*\", \"matchCriteriaId\": \"04579340-B53F-47B5-99C9-B647AAA3D303\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D7F4162-108A-470B-8E6B-C009E8C56AEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*\", \"matchCriteriaId\": \"73AB0545-3D8D-4623-8381-D71DA44E3B5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D86FC99-3521-4E22-8FD3-65CEB05A6342\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*\", \"matchCriteriaId\": \"84A291B0-EABD-4572-B8E2-2457DBAEDC92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FE05F3A-A8B5-45EE-BF52-D55E2768F890\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C6D66E2-3E10-4DEA-9E6B-53A5DE78AFCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E37786B-5336-4182-A1E3-801BDB6F61EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*\", \"matchCriteriaId\": \"349D014E-223A-46A7-8334-543DB330C215\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*\", \"matchCriteriaId\": \"550EC183-43A1-4A63-A23C-A48C1F078451\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ACECF59-AA88-4B5C-A671-83842C9CF072\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52179EC7-CAF0-42AA-A21A-7105E10CA122\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.\"}, {\"lang\": \"es\", \"value\": \"Ruby versiones 1.8.5 y anteriores, versiones 1.8.6 hasta 1.8.6-p286, versiones 1.8.7 hasta 1.8.7-p71, y versiones 1.9 hasta r18423, no restringe apropiadamente el acceso a variables y m\\u00e9todos cr\\u00edticos en varios niveles seguros, lo que permite a los atacantes dependiendo del contexto omitir las restricciones de acceso previstas por medio de (1) untrace_var, (2) $PROGRAM_NAME, y (3) syslog en nivel seguro 4 y (4) m\\u00e9todos no confiables en los niveles seguros 1 a 3.\"}]",
"id": "CVE-2008-3655",
"lastModified": "2024-11-21T00:49:47.800",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2008-08-13T01:41:00.000",
"references": "[{\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/31430\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31697\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32165\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32219\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32255\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32256\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32371\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32372\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33178\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35074\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200812-17.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.apple.com/kb/HT3549\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1651\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1652\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0895.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0897.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/495884/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/30644\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1020656\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2334\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1297\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/44369\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://usn.ubuntu.com/651-1/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/31430\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/31697\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32165\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32219\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32255\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32256\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32371\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/32372\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/33178\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35074\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-200812-17.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT3549\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2008/dsa-1651\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.debian.org/security/2008/dsa-1652\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0895.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2008-0897.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/495884/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/30644\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1020656\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2008/2334\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1297\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/44369\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://usn.ubuntu.com/651-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2008-3655\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-08-13T01:41:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.\"},{\"lang\":\"es\",\"value\":\"Ruby versiones 1.8.5 y anteriores, versiones 1.8.6 hasta 1.8.6-p286, versiones 1.8.7 hasta 1.8.7-p71, y versiones 1.9 hasta r18423, no restringe apropiadamente el acceso a variables y m\u00e9todos cr\u00edticos en varios niveles seguros, lo que permite a los atacantes dependiendo del contexto omitir las restricciones de acceso previstas por medio de (1) untrace_var, (2) $PROGRAM_NAME, y (3) syslog en nivel seguro 4 y (4) m\u00e9todos no confiables en los niveles seguros 1 a 3.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.8.5\",\"matchCriteriaId\":\"9721AB68-8002-4F85-98BC-0E6FDF7CDF6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46086C6A-9068-4959-BEE7-4D76BDEA3962\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16BDFA5C-35BE-4B7E-BD2D-C28B095F62E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31160797-6920-4BA1-B355-1CCD1FCDBFC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC306E85-66D8-4384-BBC3-92DC99C85FC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5675C37-39EF-41EF-9A53-3FCE4CF23820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*\",\"matchCriteriaId\":\"39609530-0A81-481E-BDA4-5A98327EAD11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C19ADE91-4D9E-43ED-A605-E504B9090119\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D89E3027-C2ED-4CC6-86F5-1B791576B6EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F29ADA-E6DC-456F-9E63-C56C68EF7E5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B1C113-682E-4F7D-BCF0-E30C446C4AC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BAF9471-B532-4194-AB3C-5AA28432FF27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*\",\"matchCriteriaId\":\"51BE9728-A5FE-486A-8DB9-711E46243132\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC1B910-C0FA-4943-92B1-597842E84015\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A78ECCA9-6F07-4A63-8BF7-8D40F2439552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*\",\"matchCriteriaId\":\"14513719-4ED8-4EAB-B4D8-29849B868BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*\",\"matchCriteriaId\":\"92E3814D-BEEA-4E46-9CED-9D8059727D14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7D3F32-EFB7-4628-9328-36C6A306B399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1A95E9F-AEC5-4AF9-B7D9-52DDDECB7E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*\",\"matchCriteriaId\":\"9328DE73-420B-4280-85A4-ABEFC4679676\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F382FBD-6163-4A5B-AEB3-A15A843329F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4399121F-9BC7-4A67-8B0B-ED3B94A16D56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFE61EB9-2544-4E48-B313-63A99F4F5241\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6122187F-2371-429A-971B-419B4ACE8E18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A42425D-FF21-4863-B43D-EE100DBE6BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*\",\"matchCriteriaId\":\"06512108-020D-4D71-8F60-6AA2052D7D35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E152A5-F625-4061-AD8C-4CFA085B674F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*\",\"matchCriteriaId\":\"756F5247-658C-412C-ACBF-CBE987DF748A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"876B2575-4F81-4A70-9A88-9BEE44649626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF02372D-FD0B-453F-821E-1E0BA7900711\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A6ED369-E564-4D4F-9E23-A8125194EAD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACC0DB90-C072-4BCB-9082-94394F547D35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D7ED62B-4D88-46A4-A0A3-BD37E66A5211\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*\",\"matchCriteriaId\":\"072A0C3C-9F47-4DC7-96EA-7980B45429DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0372E4-FE3E-49CD-AF55-E2E4518D34F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*\",\"matchCriteriaId\":\"04579340-B53F-47B5-99C9-B647AAA3D303\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7F4162-108A-470B-8E6B-C009E8C56AEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*\",\"matchCriteriaId\":\"73AB0545-3D8D-4623-8381-D71DA44E3B5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D86FC99-3521-4E22-8FD3-65CEB05A6342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A291B0-EABD-4572-B8E2-2457DBAEDC92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE05F3A-A8B5-45EE-BF52-D55E2768F890\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C6D66E2-3E10-4DEA-9E6B-53A5DE78AFCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E37786B-5336-4182-A1E3-801BDB6F61EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*\",\"matchCriteriaId\":\"349D014E-223A-46A7-8334-543DB330C215\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*\",\"matchCriteriaId\":\"550EC183-43A1-4A63-A23C-A48C1F078451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ACECF59-AA88-4B5C-A671-83842C9CF072\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52179EC7-CAF0-42AA-A21A-7105E10CA122\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/31430\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31697\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32165\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32219\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32255\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32256\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32371\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32372\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33178\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200812-17.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1651\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1652\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0895.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0897.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/495884/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/30644\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1020656\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2334\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44369\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/651-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/31430\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/31697\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32165\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32219\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32255\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32371\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/32372\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/33178\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200812-17.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2008/dsa-1651\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.debian.org/security/2008/dsa-1652\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0895.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0897.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.securityfocus.com/archive/1/495884/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/30644\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1020656\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2008/2334\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/44369\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/651-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
RHSA-2008:0896
Vulnerability from csaf_redhat - Published: 2008-10-21 14:54 - Updated: 2026-04-20 21:35The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\nand a fixed source port when sending DNS requests. A remote attacker could\nuse this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby\u0027s regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0896",
"url": "https://access.redhat.com/errata/RHSA-2008:0896"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "external",
"summary": "461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0896.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2026-04-20T21:35:03+00:00",
"generator": {
"date": "2026-04-20T21:35:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2008:0896",
"initial_release_date": "2008-10-21T14:54:00+00:00",
"revision_history": [
{
"date": "2008-10-21T14:54:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-21T10:52:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-20T21:35:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.ia64",
"product_id": "ruby-libs-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-0:1.6.8-13.el3.ia64",
"product_id": "ruby-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.ia64",
"product": {
"name": "irb-0:1.6.8-13.el3.ia64",
"product_id": "irb-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.ia64",
"product_id": "ruby-mode-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.ia64",
"product_id": "ruby-devel-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.ia64",
"product_id": "ruby-docs-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.i386",
"product_id": "ruby-libs-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-0:1.6.8-13.el3.i386",
"product_id": "ruby-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.i386",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.i386",
"product": {
"name": "irb-0:1.6.8-13.el3.i386",
"product_id": "irb-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.i386",
"product_id": "ruby-mode-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.i386",
"product_id": "ruby-devel-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.i386",
"product_id": "ruby-docs-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-libs-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.x86_64",
"product": {
"name": "irb-0:1.6.8-13.el3.x86_64",
"product_id": "irb-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-mode-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-devel-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-docs-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.src",
"product": {
"name": "ruby-0:1.6.8-13.el3.src",
"product_id": "ruby-0:1.6.8-13.el3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.ppc64",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc64",
"product_id": "ruby-libs-0:1.6.8-13.el3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc",
"product_id": "ruby-libs-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-0:1.6.8-13.el3.ppc",
"product_id": "ruby-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.ppc",
"product": {
"name": "irb-0:1.6.8-13.el3.ppc",
"product_id": "irb-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.ppc",
"product_id": "ruby-mode-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.ppc",
"product_id": "ruby-devel-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.ppc",
"product_id": "ruby-docs-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.s390x",
"product_id": "ruby-libs-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-0:1.6.8-13.el3.s390x",
"product_id": "ruby-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.s390x",
"product": {
"name": "irb-0:1.6.8-13.el3.s390x",
"product_id": "irb-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.s390x",
"product_id": "ruby-mode-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.s390x",
"product_id": "ruby-devel-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.s390x",
"product_id": "ruby-docs-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.s390",
"product_id": "ruby-libs-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-0:1.6.8-13.el3.s390",
"product_id": "ruby-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.s390",
"product": {
"name": "irb-0:1.6.8-13.el3.s390",
"product_id": "irb-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.s390",
"product_id": "ruby-mode-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.s390",
"product_id": "ruby-devel-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.s390",
"product_id": "ruby-docs-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.i386"
},
"product_reference": "irb-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.ia64"
},
"product_reference": "irb-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.ppc"
},
"product_reference": "irb-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.s390"
},
"product_reference": "irb-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.s390x"
},
"product_reference": "irb-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.x86_64"
},
"product_reference": "irb-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.src"
},
"product_reference": "ruby-0:1.6.8-13.el3.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.i386"
},
"product_reference": "irb-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.ia64"
},
"product_reference": "irb-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.ppc"
},
"product_reference": "irb-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.s390"
},
"product_reference": "irb-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.s390x"
},
"product_reference": "irb-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.x86_64"
},
"product_reference": "irb-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.src"
},
"product_reference": "ruby-0:1.6.8-13.el3.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.i386"
},
"product_reference": "irb-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.ia64"
},
"product_reference": "irb-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.ppc"
},
"product_reference": "irb-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.s390"
},
"product_reference": "irb-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.s390x"
},
"product_reference": "irb-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.x86_64"
},
"product_reference": "irb-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.src"
},
"product_reference": "ruby-0:1.6.8-13.el3.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.i386"
},
"product_reference": "irb-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.ia64"
},
"product_reference": "irb-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.ppc"
},
"product_reference": "irb-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.s390"
},
"product_reference": "irb-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.s390x"
},
"product_reference": "irb-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.x86_64"
},
"product_reference": "irb-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.src"
},
"product_reference": "ruby-0:1.6.8-13.el3.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-3443",
"discovery_date": "2008-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459266"
}
],
"notes": [
{
"category": "description",
"text": "The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3443"
},
{
"category": "external",
"summary": "RHBZ#459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443"
}
],
"release_date": "2008-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0896"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0896"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0896"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
}
]
}
RHSA-2008:0897
Vulnerability from csaf_redhat - Published: 2008-10-21 14:52 - Updated: 2026-04-20 21:35Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\nand a fixed source port when sending DNS requests. A remote attacker could\nuse this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n\nRuby\u0027s XML document parsing module (REXML) was prone to a denial of service\nattack via XML documents with large XML entity definitions recursion. A\nspecially-crafted XML file could cause a Ruby application using the REXML\nmodule to use an excessive amount of CPU and memory. (CVE-2008-3790)\n\nAn insufficient \"taintness\" check flaw was discovered in Ruby\u0027s DL module,\nwhich provides direct access to the C language functions. An attacker could\nuse this flaw to bypass intended safe-level restrictions by calling\nexternal C functions with the arguments from an untrusted tainted inputs.\n(CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby\u0027s HTTP server\ntoolkit. A remote attacker could send a specially-crafted HTTP request to a\nWEBrick server that would cause the server to use an excessive amount of\nCPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby\u0027s regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0897",
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "external",
"summary": "460134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460134"
},
{
"category": "external",
"summary": "461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0897.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2026-04-20T21:35:05+00:00",
"generator": {
"date": "2026-04-20T21:35:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2008:0897",
"initial_release_date": "2008-10-21T14:52:00+00:00",
"revision_history": [
{
"date": "2008-10-21T14:52:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-21T10:43:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-20T21:35:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.ia64",
"product_id": "irb-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.i386",
"product_id": "irb-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "irb-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.src",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.src",
"product_id": "ruby-0:1.8.1-7.el4_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.src",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.src",
"product_id": "ruby-0:1.8.5-5.el5_2.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.ppc",
"product_id": "irb-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.s390x",
"product_id": "irb-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.s390",
"product_id": "irb-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.src"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.src"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1145",
"discovery_date": "2008-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "435902"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) \"..%5c\" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: webrick directory traversal",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1145"
},
{
"category": "external",
"summary": "RHBZ#435902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=435902"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1145",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1145"
}
],
"release_date": "2008-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: webrick directory traversal"
},
{
"cve": "CVE-2008-3443",
"discovery_date": "2008-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459266"
}
],
"notes": [
{
"category": "description",
"text": "The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3443"
},
{
"category": "external",
"summary": "RHBZ#459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443"
}
],
"release_date": "2008-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3790",
"discovery_date": "2008-08-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "460134"
}
],
"notes": [
{
"category": "description",
"text": "The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an \"XML entity explosion.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: DoS vulnerability in the REXML module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3790"
},
{
"category": "external",
"summary": "RHBZ#460134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460134"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3790",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3790"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3790",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3790"
}
],
"release_date": "2008-08-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: DoS vulnerability in the REXML module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
}
]
}
RHSA-2026:7305
Vulnerability from csaf_redhat - Published: 2026-04-09 12:35 - Updated: 2026-04-21 13:31Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
A SMTP command injection flaw was found in the way Ruby's Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.
It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.
A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory.
It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.
Ruby's Net::FTP module trusted the IP address included in the FTP server's response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.
A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.
A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.
A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).
A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7305",
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27820",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3905",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3657",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3656",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3655",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-27282",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-31810",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-16254",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-8780",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-14064",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-10784",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-9096",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8090",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8080",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-6438",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-4975",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2013-1821",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2012-5371",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-4815",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-1891",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-28756",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-28739",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-41819",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-28965",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2020-25613",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7305.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-21T13:31:12+00:00",
"generator": {
"date": "2026-04-21T13:31:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:7305",
"initial_release_date": "2026-04-09T12:35:20+00:00",
"revision_history": [
{
"date": "2026-04-09T12:35:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-21T02:52:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-21T13:31:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@aarch64",
"product": {
"name": "ruby3-3-main@aarch64",
"product_id": "ruby3-3-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3@3.3.10-23.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@src",
"product": {
"name": "ruby3-3-main@src",
"product_id": "ruby3-3-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3@3.3.10-23.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@x86_64",
"product": {
"name": "ruby3-3-main@x86_64",
"product_id": "ruby3-3-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3@3.3.10-23.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@noarch",
"product": {
"name": "ruby3-3-main@noarch",
"product_id": "ruby3-3-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3-default-gems@3.3.10-23.1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@aarch64"
},
"product_reference": "ruby3-3-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@noarch"
},
"product_reference": "ruby3-3-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@src"
},
"product_reference": "ruby3-3-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@x86_64"
},
"product_reference": "ruby3-3-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1891",
"discovery_date": "2008-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443829"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick CGI source disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1891\n\nThe risks associated with fixing this flaw outweigh the benefits of the fix. Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "RHBZ#443829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891"
}
],
"release_date": "2008-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: WEBrick CGI source disclosure"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
},
{
"acknowledgments": [
{
"names": [
"oCERT"
]
}
],
"cve": "CVE-2011-4815",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750564"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "RHBZ#750564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-5371",
"discovery_date": "2012-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875236"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "RHBZ#875236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5371",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371"
}
],
"release_date": "2012-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"cve": "CVE-2014-4975",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2014-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1118158"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: off-by-one stack-based buffer overflow in the encodes() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "RHBZ#1118158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: off-by-one stack-based buffer overflow in the encodes() function"
},
{
"cve": "CVE-2014-6438",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2015-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490845"
}
],
"notes": [
{
"category": "description",
"text": "The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe parsing of long strings via decode_www_form_component method",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "RHBZ#1490845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/",
"url": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/"
}
],
"release_date": "2014-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unsafe parsing of long strings via decode_www_form_component method"
},
{
"cve": "CVE-2014-8080",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1157709"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML billion laughs attack via parameter entity expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "RHBZ#1157709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8080",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/",
"url": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/"
}
],
"release_date": "2014-10-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML billion laughs attack via parameter entity expansion"
},
{
"acknowledgments": [
{
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-8090",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1159927"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML incomplete fix for CVE-2014-8080",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "RHBZ#1159927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/",
"url": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/"
}
],
"release_date": "2014-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML incomplete fix for CVE-2014-8080"
},
{
"cve": "CVE-2015-9096",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2017-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1461846"
}
],
"notes": [
{
"category": "description",
"text": "A SMTP command injection flaw was found in the way Ruby\u0027s Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "RHBZ#1461846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-9096",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096"
}
],
"release_date": "2017-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP"
},
{
"cve": "CVE-2017-10784",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2017-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1492012"
}
],
"notes": [
{
"category": "description",
"text": "It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections 3. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "RHBZ#1492012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
}
],
"release_date": "2017-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick"
},
{
"cve": "CVE-2017-14064",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487552"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter\u0027s heap memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary heap exposure during a JSON.generate call",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, and 6. These versions do not include the JSON module.\n\nThis issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "RHBZ#1487552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/"
}
],
"release_date": "2017-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Arbitrary heap exposure during a JSON.generate call"
},
{
"cve": "CVE-2018-8780",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561949"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "RHBZ#1561949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
}
],
"release_date": "2018-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "workaround",
"details": "It is possible to test for presence of the NULL byte manually prior to call a Dir method with an untrusted string.",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir"
},
{
"cve": "CVE-2019-16254",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789556"
}
],
"notes": [
{
"category": "description",
"text": "Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: HTTP response splitting in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "RHBZ#1789556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254"
}
],
"release_date": "2019-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: HTTP response splitting in WEBrick"
},
{
"cve": "CVE-2020-25613",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883623"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Potential HTTP request smuggling in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "RHBZ#1883623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25613"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/",
"url": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/"
}
],
"release_date": "2020-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Potential HTTP request smuggling in WEBrick"
},
{
"cve": "CVE-2021-28965",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947526"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: XML round-trip vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "RHBZ#1947526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947526"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965"
}
],
"release_date": "2021-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: XML round-trip vulnerability in REXML"
},
{
"cve": "CVE-2021-31810",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980126"
}
],
"notes": [
{
"category": "description",
"text": "Ruby\u0027s Net::FTP module trusted the IP address included in the FTP server\u0027s response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat CloudForms 5.11 does not ship Ruby or RubyGem net-ftp and thus not affected by the flaw. RubyGem net-sftp (Ruby implementation of Secure File Transfer Protocol) which product ship is different library component from the affected package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "RHBZ#1980126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980126"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/",
"url": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host"
},
{
"cve": "CVE-2021-41819",
"discovery_date": "2021-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2026757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Cookie prefix spoofing in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "RHBZ#2026757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819"
}
],
"release_date": "2021-11-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Cookie prefix spoofing in CGI::Cookie.parse"
},
{
"cve": "CVE-2022-28739",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2075687"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Buffer overrun in String-to-Float conversion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "RHBZ#2075687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075687"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/",
"url": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"
}
],
"release_date": "2022-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Buffer overrun in String-to-Float conversion"
},
{
"cve": "CVE-2023-28756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184061"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: ReDoS vulnerability in Time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "RHBZ#2184061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/",
"url": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"
}
],
"release_date": "2023-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: ReDoS vulnerability in Time"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276810"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary memory address read vulnerability with Regex search",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-27282 vulnerability in Ruby is classified as a Moderate severity issue due to its potential to expose arbitrary heap data relative to the start of the text through the Ruby regex compiler. While the vulnerability allows the extraction of pointers and sensitive strings from memory, its exploitation requires attacker-supplied data to be provided to the regex compiler. This means that an attacker would need to craft specific input to exploit the issue, limiting the ease of exploitation compared to vulnerabilities that might be remotely exploitable without user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "RHBZ#2276810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276810"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/",
"url": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"
}
],
"release_date": "2024-04-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Arbitrary memory address read vulnerability with Regex search"
},
{
"cve": "CVE-2026-27820",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-16T18:00:53.206650+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2459002"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A buffer overflow vulnerability exists in the Zlib::GzipReader component of the Ruby zlib interface. This flaw, caused by insufficient memory capacity during data manipulation, could lead to memory corruption and system instability. This vulnerability is considered of a Moderate severity this happens because the high complexity to exploit, additionally the attacker may have not full control over the data is being corrupted or exfiltrated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "RHBZ#2459002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w",
"url": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3467067",
"url": "https://hackerone.com/reports/3467067"
}
],
"release_date": "2026-04-16T17:27:48.944000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader"
}
]
}
RHSA-2008:0895
Vulnerability from csaf_redhat - Published: 2008-10-21 14:52 - Updated: 2026-04-20 21:35The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix various security issues are now available\nfor Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby\u0027s regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0895",
"url": "https://access.redhat.com/errata/RHSA-2008:0895"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0895.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2026-04-20T21:35:00+00:00",
"generator": {
"date": "2026-04-20T21:35:00+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2008:0895",
"initial_release_date": "2008-10-21T14:52:00+00:00",
"revision_history": [
{
"date": "2008-10-21T14:52:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-21T10:52:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-20T21:35:00+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "irb-0:1.6.4-7.el2.i386",
"product": {
"name": "irb-0:1.6.4-7.el2.i386",
"product_id": "irb-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.4-7.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.4-7.el2.i386",
"product": {
"name": "ruby-0:1.6.4-7.el2.i386",
"product_id": "ruby-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.4-7.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.4-7.el2.i386",
"product": {
"name": "ruby-devel-0:1.6.4-7.el2.i386",
"product_id": "ruby-devel-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.4-7.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.6.4-7.el2.i386",
"product": {
"name": "ruby-libs-0:1.6.4-7.el2.i386",
"product_id": "ruby-libs-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.4-7.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.4-7.el2.i386",
"product": {
"name": "ruby-docs-0:1.6.4-7.el2.i386",
"product_id": "ruby-docs-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.4-7.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.4-7.el2.i386",
"product": {
"name": "ruby-tcltk-0:1.6.4-7.el2.i386",
"product_id": "ruby-tcltk-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.4-7.el2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.6.4-7.el2.src",
"product": {
"name": "ruby-0:1.6.4-7.el2.src",
"product_id": "ruby-0:1.6.4-7.el2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.4-7.el2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:irb-0:1.6.4-7.el2.i386"
},
"product_reference": "irb-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-0:1.6.4-7.el2.src"
},
"product_reference": "ruby-0:1.6.4-7.el2.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-devel-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-devel-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-docs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-docs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-libs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-libs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-tcltk-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-tcltk-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:irb-0:1.6.4-7.el2.i386"
},
"product_reference": "irb-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-0:1.6.4-7.el2.src"
},
"product_reference": "ruby-0:1.6.4-7.el2.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-devel-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-devel-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-docs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-docs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-libs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-libs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-tcltk-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-tcltk-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:irb-0:1.6.4-7.el2.i386"
},
"product_reference": "irb-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-0:1.6.4-7.el2.src"
},
"product_reference": "ruby-0:1.6.4-7.el2.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-devel-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-devel-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-docs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-docs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-libs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-libs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-tcltk-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-tcltk-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-3443",
"discovery_date": "2008-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459266"
}
],
"notes": [
{
"category": "description",
"text": "The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:irb-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.src",
"2.1AS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1AS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1ES:irb-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.src",
"2.1ES:ruby-devel-0:1.6.4-7.el2.i386",
"2.1ES:ruby-docs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-libs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1WS:irb-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.src",
"2.1WS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1WS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-tcltk-0:1.6.4-7.el2.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3443"
},
{
"category": "external",
"summary": "RHBZ#459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443"
}
],
"release_date": "2008-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:irb-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.src",
"2.1AS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1AS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1ES:irb-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.src",
"2.1ES:ruby-devel-0:1.6.4-7.el2.i386",
"2.1ES:ruby-docs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-libs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1WS:irb-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.src",
"2.1WS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1WS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-tcltk-0:1.6.4-7.el2.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0895"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:irb-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.src",
"2.1AS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1AS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1ES:irb-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.src",
"2.1ES:ruby-devel-0:1.6.4-7.el2.i386",
"2.1ES:ruby-docs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-libs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1WS:irb-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.src",
"2.1WS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1WS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-tcltk-0:1.6.4-7.el2.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:irb-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.src",
"2.1AS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1AS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1ES:irb-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.src",
"2.1ES:ruby-devel-0:1.6.4-7.el2.i386",
"2.1ES:ruby-docs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-libs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1WS:irb-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.src",
"2.1WS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1WS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-tcltk-0:1.6.4-7.el2.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0895"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
}
]
}
RHSA-2008_0895
Vulnerability from csaf_redhat - Published: 2008-10-21 14:52 - Updated: 2024-11-22 02:16The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix various security issues are now available\nfor Red Hat Enterprise Linux 2.1.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby\u0027s regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0895",
"url": "https://access.redhat.com/errata/RHSA-2008:0895"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0895.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T02:16:50+00:00",
"generator": {
"date": "2024-11-22T02:16:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0895",
"initial_release_date": "2008-10-21T14:52:00+00:00",
"revision_history": [
{
"date": "2008-10-21T14:52:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-21T10:52:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:16:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product": {
"name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 2.1",
"product": {
"name": "Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 2.1",
"product": {
"name": "Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "irb-0:1.6.4-7.el2.i386",
"product": {
"name": "irb-0:1.6.4-7.el2.i386",
"product_id": "irb-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.4-7.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.4-7.el2.i386",
"product": {
"name": "ruby-0:1.6.4-7.el2.i386",
"product_id": "ruby-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.4-7.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.4-7.el2.i386",
"product": {
"name": "ruby-devel-0:1.6.4-7.el2.i386",
"product_id": "ruby-devel-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.4-7.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.6.4-7.el2.i386",
"product": {
"name": "ruby-libs-0:1.6.4-7.el2.i386",
"product_id": "ruby-libs-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.4-7.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.4-7.el2.i386",
"product": {
"name": "ruby-docs-0:1.6.4-7.el2.i386",
"product_id": "ruby-docs-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.4-7.el2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.4-7.el2.i386",
"product": {
"name": "ruby-tcltk-0:1.6.4-7.el2.i386",
"product_id": "ruby-tcltk-0:1.6.4-7.el2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.4-7.el2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.6.4-7.el2.src",
"product": {
"name": "ruby-0:1.6.4-7.el2.src",
"product_id": "ruby-0:1.6.4-7.el2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.4-7.el2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:irb-0:1.6.4-7.el2.i386"
},
"product_reference": "irb-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.src as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-0:1.6.4-7.el2.src"
},
"product_reference": "ruby-0:1.6.4-7.el2.src",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-devel-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-devel-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-docs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-docs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-libs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-libs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ",
"product_id": "2.1AS:ruby-tcltk-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-tcltk-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:irb-0:1.6.4-7.el2.i386"
},
"product_reference": "irb-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.src as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-0:1.6.4-7.el2.src"
},
"product_reference": "ruby-0:1.6.4-7.el2.src",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-devel-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-devel-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-docs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-docs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-libs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-libs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux ES version 2.1",
"product_id": "2.1ES:ruby-tcltk-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-tcltk-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:irb-0:1.6.4-7.el2.i386"
},
"product_reference": "irb-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.4-7.el2.src as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-0:1.6.4-7.el2.src"
},
"product_reference": "ruby-0:1.6.4-7.el2.src",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-devel-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-devel-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-docs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-docs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-libs-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-libs-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.4-7.el2.i386 as a component of Red Hat Enterprise Linux WS version 2.1",
"product_id": "2.1WS:ruby-tcltk-0:1.6.4-7.el2.i386"
},
"product_reference": "ruby-tcltk-0:1.6.4-7.el2.i386",
"relates_to_product_reference": "2.1WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-3443",
"discovery_date": "2008-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459266"
}
],
"notes": [
{
"category": "description",
"text": "The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:irb-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.src",
"2.1AS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1AS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1ES:irb-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.src",
"2.1ES:ruby-devel-0:1.6.4-7.el2.i386",
"2.1ES:ruby-docs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-libs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1WS:irb-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.src",
"2.1WS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1WS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-tcltk-0:1.6.4-7.el2.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3443"
},
{
"category": "external",
"summary": "RHBZ#459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443"
}
],
"release_date": "2008-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:irb-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.src",
"2.1AS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1AS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1ES:irb-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.src",
"2.1ES:ruby-devel-0:1.6.4-7.el2.i386",
"2.1ES:ruby-docs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-libs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1WS:irb-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.src",
"2.1WS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1WS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-tcltk-0:1.6.4-7.el2.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0895"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"2.1AS:irb-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.src",
"2.1AS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1AS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1ES:irb-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.src",
"2.1ES:ruby-devel-0:1.6.4-7.el2.i386",
"2.1ES:ruby-docs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-libs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1WS:irb-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.src",
"2.1WS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1WS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-tcltk-0:1.6.4-7.el2.i386"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"2.1AS:irb-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.i386",
"2.1AS:ruby-0:1.6.4-7.el2.src",
"2.1AS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1AS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1AS:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1ES:irb-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.i386",
"2.1ES:ruby-0:1.6.4-7.el2.src",
"2.1ES:ruby-devel-0:1.6.4-7.el2.i386",
"2.1ES:ruby-docs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-libs-0:1.6.4-7.el2.i386",
"2.1ES:ruby-tcltk-0:1.6.4-7.el2.i386",
"2.1WS:irb-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.i386",
"2.1WS:ruby-0:1.6.4-7.el2.src",
"2.1WS:ruby-devel-0:1.6.4-7.el2.i386",
"2.1WS:ruby-docs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-libs-0:1.6.4-7.el2.i386",
"2.1WS:ruby-tcltk-0:1.6.4-7.el2.i386"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0895"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
}
]
}
RHSA-2008_0896
Vulnerability from csaf_redhat - Published: 2008-10-21 14:54 - Updated: 2024-11-22 02:16The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\nand a fixed source port when sending DNS requests. A remote attacker could\nuse this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby\u0027s regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0896",
"url": "https://access.redhat.com/errata/RHSA-2008:0896"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "external",
"summary": "461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0896.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T02:16:54+00:00",
"generator": {
"date": "2024-11-22T02:16:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0896",
"initial_release_date": "2008-10-21T14:54:00+00:00",
"revision_history": [
{
"date": "2008-10-21T14:54:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-21T10:52:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:16:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.ia64",
"product_id": "ruby-libs-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-0:1.6.8-13.el3.ia64",
"product_id": "ruby-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.ia64",
"product": {
"name": "irb-0:1.6.8-13.el3.ia64",
"product_id": "irb-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.ia64",
"product_id": "ruby-mode-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.ia64",
"product_id": "ruby-devel-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.ia64",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.ia64",
"product_id": "ruby-docs-0:1.6.8-13.el3.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.i386",
"product_id": "ruby-libs-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-0:1.6.8-13.el3.i386",
"product_id": "ruby-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.i386",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.i386",
"product": {
"name": "irb-0:1.6.8-13.el3.i386",
"product_id": "irb-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.i386",
"product_id": "ruby-mode-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.i386",
"product_id": "ruby-devel-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.i386",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.i386",
"product_id": "ruby-docs-0:1.6.8-13.el3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-libs-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.x86_64",
"product": {
"name": "irb-0:1.6.8-13.el3.x86_64",
"product_id": "irb-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-mode-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-devel-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.x86_64",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.x86_64",
"product_id": "ruby-docs-0:1.6.8-13.el3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.src",
"product": {
"name": "ruby-0:1.6.8-13.el3.src",
"product_id": "ruby-0:1.6.8-13.el3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.ppc64",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc64",
"product_id": "ruby-libs-0:1.6.8-13.el3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc",
"product_id": "ruby-libs-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-0:1.6.8-13.el3.ppc",
"product_id": "ruby-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.ppc",
"product": {
"name": "irb-0:1.6.8-13.el3.ppc",
"product_id": "irb-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.ppc",
"product_id": "ruby-mode-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.ppc",
"product_id": "ruby-devel-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.ppc",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.ppc",
"product_id": "ruby-docs-0:1.6.8-13.el3.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.s390x",
"product_id": "ruby-libs-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-0:1.6.8-13.el3.s390x",
"product_id": "ruby-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.s390x",
"product": {
"name": "irb-0:1.6.8-13.el3.s390x",
"product_id": "irb-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.s390x",
"product_id": "ruby-mode-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.s390x",
"product_id": "ruby-devel-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.s390x",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.s390x",
"product_id": "ruby-docs-0:1.6.8-13.el3.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-libs-0:1.6.8-13.el3.s390",
"product_id": "ruby-libs-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"product_id": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-0:1.6.8-13.el3.s390",
"product_id": "ruby-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390",
"product_id": "ruby-tcltk-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.6.8-13.el3.s390",
"product": {
"name": "irb-0:1.6.8-13.el3.s390",
"product_id": "irb-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-mode-0:1.6.8-13.el3.s390",
"product_id": "ruby-mode-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-devel-0:1.6.8-13.el3.s390",
"product_id": "ruby-devel-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.6.8-13.el3?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.6.8-13.el3.s390",
"product": {
"name": "ruby-docs-0:1.6.8-13.el3.s390",
"product_id": "ruby-docs-0:1.6.8-13.el3.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.6.8-13.el3?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.i386"
},
"product_reference": "irb-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.ia64"
},
"product_reference": "irb-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.ppc"
},
"product_reference": "irb-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.s390"
},
"product_reference": "irb-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.s390x"
},
"product_reference": "irb-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:irb-0:1.6.8-13.el3.x86_64"
},
"product_reference": "irb-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.src"
},
"product_reference": "ruby-0:1.6.8-13.el3.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-devel-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-docs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-libs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-mode-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.i386"
},
"product_reference": "irb-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.ia64"
},
"product_reference": "irb-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.ppc"
},
"product_reference": "irb-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.s390"
},
"product_reference": "irb-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.s390x"
},
"product_reference": "irb-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:irb-0:1.6.8-13.el3.x86_64"
},
"product_reference": "irb-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.src"
},
"product_reference": "ruby-0:1.6.8-13.el3.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.i386"
},
"product_reference": "irb-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.ia64"
},
"product_reference": "irb-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.ppc"
},
"product_reference": "irb-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.s390"
},
"product_reference": "irb-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.s390x"
},
"product_reference": "irb-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:irb-0:1.6.8-13.el3.x86_64"
},
"product_reference": "irb-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.src"
},
"product_reference": "ruby-0:1.6.8-13.el3.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-devel-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-docs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-libs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-mode-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.i386"
},
"product_reference": "irb-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.ia64"
},
"product_reference": "irb-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.ppc"
},
"product_reference": "irb-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.s390"
},
"product_reference": "irb-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.s390x"
},
"product_reference": "irb-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:irb-0:1.6.8-13.el3.x86_64"
},
"product_reference": "irb-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.src"
},
"product_reference": "ruby-0:1.6.8-13.el3.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-devel-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-devel-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-docs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-docs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.ppc64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.ppc64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.ppc64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-libs-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-libs-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-mode-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-mode-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.i386"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.ia64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.ppc"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.s390"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.s390x"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.6.8-13.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
},
"product_reference": "ruby-tcltk-0:1.6.8-13.el3.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-3443",
"discovery_date": "2008-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459266"
}
],
"notes": [
{
"category": "description",
"text": "The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3443"
},
{
"category": "external",
"summary": "RHBZ#459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443"
}
],
"release_date": "2008-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0896"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0896"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:54:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"3AS:irb-0:1.6.8-13.el3.i386",
"3AS:irb-0:1.6.8-13.el3.ia64",
"3AS:irb-0:1.6.8-13.el3.ppc",
"3AS:irb-0:1.6.8-13.el3.s390",
"3AS:irb-0:1.6.8-13.el3.s390x",
"3AS:irb-0:1.6.8-13.el3.x86_64",
"3AS:ruby-0:1.6.8-13.el3.i386",
"3AS:ruby-0:1.6.8-13.el3.ia64",
"3AS:ruby-0:1.6.8-13.el3.ppc",
"3AS:ruby-0:1.6.8-13.el3.s390",
"3AS:ruby-0:1.6.8-13.el3.s390x",
"3AS:ruby-0:1.6.8-13.el3.src",
"3AS:ruby-0:1.6.8-13.el3.x86_64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3AS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3AS:ruby-devel-0:1.6.8-13.el3.i386",
"3AS:ruby-devel-0:1.6.8-13.el3.ia64",
"3AS:ruby-devel-0:1.6.8-13.el3.ppc",
"3AS:ruby-devel-0:1.6.8-13.el3.s390",
"3AS:ruby-devel-0:1.6.8-13.el3.s390x",
"3AS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3AS:ruby-docs-0:1.6.8-13.el3.i386",
"3AS:ruby-docs-0:1.6.8-13.el3.ia64",
"3AS:ruby-docs-0:1.6.8-13.el3.ppc",
"3AS:ruby-docs-0:1.6.8-13.el3.s390",
"3AS:ruby-docs-0:1.6.8-13.el3.s390x",
"3AS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-libs-0:1.6.8-13.el3.i386",
"3AS:ruby-libs-0:1.6.8-13.el3.ia64",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc",
"3AS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3AS:ruby-libs-0:1.6.8-13.el3.s390",
"3AS:ruby-libs-0:1.6.8-13.el3.s390x",
"3AS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3AS:ruby-mode-0:1.6.8-13.el3.i386",
"3AS:ruby-mode-0:1.6.8-13.el3.ia64",
"3AS:ruby-mode-0:1.6.8-13.el3.ppc",
"3AS:ruby-mode-0:1.6.8-13.el3.s390",
"3AS:ruby-mode-0:1.6.8-13.el3.s390x",
"3AS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3AS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3AS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3AS:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3Desktop:irb-0:1.6.8-13.el3.i386",
"3Desktop:irb-0:1.6.8-13.el3.ia64",
"3Desktop:irb-0:1.6.8-13.el3.ppc",
"3Desktop:irb-0:1.6.8-13.el3.s390",
"3Desktop:irb-0:1.6.8-13.el3.s390x",
"3Desktop:irb-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-0:1.6.8-13.el3.i386",
"3Desktop:ruby-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-0:1.6.8-13.el3.s390",
"3Desktop:ruby-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-0:1.6.8-13.el3.src",
"3Desktop:ruby-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.i386",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-devel-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390",
"3Desktop:ruby-devel-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-devel-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-docs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-docs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-docs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.i386",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-libs-0:1.6.8-13.el3.ppc64",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390",
"3Desktop:ruby-libs-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-libs-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.i386",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-mode-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390",
"3Desktop:ruby-mode-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-mode-0:1.6.8-13.el3.x86_64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.i386",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3Desktop:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3ES:irb-0:1.6.8-13.el3.i386",
"3ES:irb-0:1.6.8-13.el3.ia64",
"3ES:irb-0:1.6.8-13.el3.ppc",
"3ES:irb-0:1.6.8-13.el3.s390",
"3ES:irb-0:1.6.8-13.el3.s390x",
"3ES:irb-0:1.6.8-13.el3.x86_64",
"3ES:ruby-0:1.6.8-13.el3.i386",
"3ES:ruby-0:1.6.8-13.el3.ia64",
"3ES:ruby-0:1.6.8-13.el3.ppc",
"3ES:ruby-0:1.6.8-13.el3.s390",
"3ES:ruby-0:1.6.8-13.el3.s390x",
"3ES:ruby-0:1.6.8-13.el3.src",
"3ES:ruby-0:1.6.8-13.el3.x86_64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3ES:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3ES:ruby-devel-0:1.6.8-13.el3.i386",
"3ES:ruby-devel-0:1.6.8-13.el3.ia64",
"3ES:ruby-devel-0:1.6.8-13.el3.ppc",
"3ES:ruby-devel-0:1.6.8-13.el3.s390",
"3ES:ruby-devel-0:1.6.8-13.el3.s390x",
"3ES:ruby-devel-0:1.6.8-13.el3.x86_64",
"3ES:ruby-docs-0:1.6.8-13.el3.i386",
"3ES:ruby-docs-0:1.6.8-13.el3.ia64",
"3ES:ruby-docs-0:1.6.8-13.el3.ppc",
"3ES:ruby-docs-0:1.6.8-13.el3.s390",
"3ES:ruby-docs-0:1.6.8-13.el3.s390x",
"3ES:ruby-docs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-libs-0:1.6.8-13.el3.i386",
"3ES:ruby-libs-0:1.6.8-13.el3.ia64",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc",
"3ES:ruby-libs-0:1.6.8-13.el3.ppc64",
"3ES:ruby-libs-0:1.6.8-13.el3.s390",
"3ES:ruby-libs-0:1.6.8-13.el3.s390x",
"3ES:ruby-libs-0:1.6.8-13.el3.x86_64",
"3ES:ruby-mode-0:1.6.8-13.el3.i386",
"3ES:ruby-mode-0:1.6.8-13.el3.ia64",
"3ES:ruby-mode-0:1.6.8-13.el3.ppc",
"3ES:ruby-mode-0:1.6.8-13.el3.s390",
"3ES:ruby-mode-0:1.6.8-13.el3.s390x",
"3ES:ruby-mode-0:1.6.8-13.el3.x86_64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.i386",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3ES:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390",
"3ES:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3ES:ruby-tcltk-0:1.6.8-13.el3.x86_64",
"3WS:irb-0:1.6.8-13.el3.i386",
"3WS:irb-0:1.6.8-13.el3.ia64",
"3WS:irb-0:1.6.8-13.el3.ppc",
"3WS:irb-0:1.6.8-13.el3.s390",
"3WS:irb-0:1.6.8-13.el3.s390x",
"3WS:irb-0:1.6.8-13.el3.x86_64",
"3WS:ruby-0:1.6.8-13.el3.i386",
"3WS:ruby-0:1.6.8-13.el3.ia64",
"3WS:ruby-0:1.6.8-13.el3.ppc",
"3WS:ruby-0:1.6.8-13.el3.s390",
"3WS:ruby-0:1.6.8-13.el3.s390x",
"3WS:ruby-0:1.6.8-13.el3.src",
"3WS:ruby-0:1.6.8-13.el3.x86_64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.i386",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ia64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.ppc64",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.s390x",
"3WS:ruby-debuginfo-0:1.6.8-13.el3.x86_64",
"3WS:ruby-devel-0:1.6.8-13.el3.i386",
"3WS:ruby-devel-0:1.6.8-13.el3.ia64",
"3WS:ruby-devel-0:1.6.8-13.el3.ppc",
"3WS:ruby-devel-0:1.6.8-13.el3.s390",
"3WS:ruby-devel-0:1.6.8-13.el3.s390x",
"3WS:ruby-devel-0:1.6.8-13.el3.x86_64",
"3WS:ruby-docs-0:1.6.8-13.el3.i386",
"3WS:ruby-docs-0:1.6.8-13.el3.ia64",
"3WS:ruby-docs-0:1.6.8-13.el3.ppc",
"3WS:ruby-docs-0:1.6.8-13.el3.s390",
"3WS:ruby-docs-0:1.6.8-13.el3.s390x",
"3WS:ruby-docs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-libs-0:1.6.8-13.el3.i386",
"3WS:ruby-libs-0:1.6.8-13.el3.ia64",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc",
"3WS:ruby-libs-0:1.6.8-13.el3.ppc64",
"3WS:ruby-libs-0:1.6.8-13.el3.s390",
"3WS:ruby-libs-0:1.6.8-13.el3.s390x",
"3WS:ruby-libs-0:1.6.8-13.el3.x86_64",
"3WS:ruby-mode-0:1.6.8-13.el3.i386",
"3WS:ruby-mode-0:1.6.8-13.el3.ia64",
"3WS:ruby-mode-0:1.6.8-13.el3.ppc",
"3WS:ruby-mode-0:1.6.8-13.el3.s390",
"3WS:ruby-mode-0:1.6.8-13.el3.s390x",
"3WS:ruby-mode-0:1.6.8-13.el3.x86_64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.i386",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ia64",
"3WS:ruby-tcltk-0:1.6.8-13.el3.ppc",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390",
"3WS:ruby-tcltk-0:1.6.8-13.el3.s390x",
"3WS:ruby-tcltk-0:1.6.8-13.el3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0896"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
}
]
}
RHSA-2026:7307
Vulnerability from csaf_redhat - Published: 2026-04-09 12:37 - Updated: 2026-04-21 13:32Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
A SMTP command injection flaw was found in the way Ruby's Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.
It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.
A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory.
It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.
Ruby's Net::FTP module trusted the IP address included in the FTP server's response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.
A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.
A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.
A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).
A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7307",
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27820",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3905",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3657",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3656",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3655",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-27282",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-31810",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-16254",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-8780",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-14064",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-10784",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-9096",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8090",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8080",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-6438",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-4975",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2013-1821",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2012-5371",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-4815",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-1891",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-28756",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-28739",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-41819",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-28965",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2020-25613",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7307.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-21T13:32:50+00:00",
"generator": {
"date": "2026-04-21T13:32:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:7307",
"initial_release_date": "2026-04-09T12:37:08+00:00",
"revision_history": [
{
"date": "2026-04-09T12:37:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-21T02:53:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-21T13:32:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@aarch64",
"product": {
"name": "ruby3-4-main@aarch64",
"product_id": "ruby3-4-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4@3.4.8-31.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@src",
"product": {
"name": "ruby3-4-main@src",
"product_id": "ruby3-4-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4@3.4.8-31.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@x86_64",
"product": {
"name": "ruby3-4-main@x86_64",
"product_id": "ruby3-4-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4@3.4.8-31.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@noarch",
"product": {
"name": "ruby3-4-main@noarch",
"product_id": "ruby3-4-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4-default-gems@3.4.8-31.1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@aarch64"
},
"product_reference": "ruby3-4-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@noarch"
},
"product_reference": "ruby3-4-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@src"
},
"product_reference": "ruby3-4-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@x86_64"
},
"product_reference": "ruby3-4-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1891",
"discovery_date": "2008-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443829"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick CGI source disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1891\n\nThe risks associated with fixing this flaw outweigh the benefits of the fix. Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "RHBZ#443829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891"
}
],
"release_date": "2008-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: WEBrick CGI source disclosure"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
},
{
"acknowledgments": [
{
"names": [
"oCERT"
]
}
],
"cve": "CVE-2011-4815",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750564"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "RHBZ#750564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-5371",
"discovery_date": "2012-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875236"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "RHBZ#875236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5371",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371"
}
],
"release_date": "2012-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"cve": "CVE-2014-4975",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2014-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1118158"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: off-by-one stack-based buffer overflow in the encodes() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "RHBZ#1118158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: off-by-one stack-based buffer overflow in the encodes() function"
},
{
"cve": "CVE-2014-6438",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2015-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490845"
}
],
"notes": [
{
"category": "description",
"text": "The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe parsing of long strings via decode_www_form_component method",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "RHBZ#1490845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/",
"url": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/"
}
],
"release_date": "2014-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unsafe parsing of long strings via decode_www_form_component method"
},
{
"cve": "CVE-2014-8080",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1157709"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML billion laughs attack via parameter entity expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "RHBZ#1157709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8080",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/",
"url": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/"
}
],
"release_date": "2014-10-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML billion laughs attack via parameter entity expansion"
},
{
"acknowledgments": [
{
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-8090",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1159927"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML incomplete fix for CVE-2014-8080",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "RHBZ#1159927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/",
"url": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/"
}
],
"release_date": "2014-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML incomplete fix for CVE-2014-8080"
},
{
"cve": "CVE-2015-9096",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2017-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1461846"
}
],
"notes": [
{
"category": "description",
"text": "A SMTP command injection flaw was found in the way Ruby\u0027s Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "RHBZ#1461846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-9096",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096"
}
],
"release_date": "2017-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP"
},
{
"cve": "CVE-2017-10784",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2017-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1492012"
}
],
"notes": [
{
"category": "description",
"text": "It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections 3. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "RHBZ#1492012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
}
],
"release_date": "2017-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick"
},
{
"cve": "CVE-2017-14064",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487552"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter\u0027s heap memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary heap exposure during a JSON.generate call",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, and 6. These versions do not include the JSON module.\n\nThis issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "RHBZ#1487552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/"
}
],
"release_date": "2017-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Arbitrary heap exposure during a JSON.generate call"
},
{
"cve": "CVE-2018-8780",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561949"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "RHBZ#1561949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
}
],
"release_date": "2018-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "workaround",
"details": "It is possible to test for presence of the NULL byte manually prior to call a Dir method with an untrusted string.",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir"
},
{
"cve": "CVE-2019-16254",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789556"
}
],
"notes": [
{
"category": "description",
"text": "Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: HTTP response splitting in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "RHBZ#1789556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254"
}
],
"release_date": "2019-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: HTTP response splitting in WEBrick"
},
{
"cve": "CVE-2020-25613",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883623"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Potential HTTP request smuggling in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "RHBZ#1883623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25613"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/",
"url": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/"
}
],
"release_date": "2020-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Potential HTTP request smuggling in WEBrick"
},
{
"cve": "CVE-2021-28965",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947526"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: XML round-trip vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "RHBZ#1947526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947526"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965"
}
],
"release_date": "2021-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: XML round-trip vulnerability in REXML"
},
{
"cve": "CVE-2021-31810",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980126"
}
],
"notes": [
{
"category": "description",
"text": "Ruby\u0027s Net::FTP module trusted the IP address included in the FTP server\u0027s response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat CloudForms 5.11 does not ship Ruby or RubyGem net-ftp and thus not affected by the flaw. RubyGem net-sftp (Ruby implementation of Secure File Transfer Protocol) which product ship is different library component from the affected package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "RHBZ#1980126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980126"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/",
"url": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host"
},
{
"cve": "CVE-2021-41819",
"discovery_date": "2021-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2026757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Cookie prefix spoofing in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "RHBZ#2026757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819"
}
],
"release_date": "2021-11-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Cookie prefix spoofing in CGI::Cookie.parse"
},
{
"cve": "CVE-2022-28739",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2075687"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Buffer overrun in String-to-Float conversion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "RHBZ#2075687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075687"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/",
"url": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"
}
],
"release_date": "2022-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Buffer overrun in String-to-Float conversion"
},
{
"cve": "CVE-2023-28756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184061"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: ReDoS vulnerability in Time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "RHBZ#2184061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/",
"url": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"
}
],
"release_date": "2023-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: ReDoS vulnerability in Time"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276810"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary memory address read vulnerability with Regex search",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-27282 vulnerability in Ruby is classified as a Moderate severity issue due to its potential to expose arbitrary heap data relative to the start of the text through the Ruby regex compiler. While the vulnerability allows the extraction of pointers and sensitive strings from memory, its exploitation requires attacker-supplied data to be provided to the regex compiler. This means that an attacker would need to craft specific input to exploit the issue, limiting the ease of exploitation compared to vulnerabilities that might be remotely exploitable without user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "RHBZ#2276810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276810"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/",
"url": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"
}
],
"release_date": "2024-04-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Arbitrary memory address read vulnerability with Regex search"
},
{
"cve": "CVE-2026-27820",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-16T18:00:53.206650+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2459002"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A buffer overflow vulnerability exists in the Zlib::GzipReader component of the Ruby zlib interface. This flaw, caused by insufficient memory capacity during data manipulation, could lead to memory corruption and system instability. This vulnerability is considered of a Moderate severity this happens because the high complexity to exploit, additionally the attacker may have not full control over the data is being corrupted or exfiltrated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "RHBZ#2459002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w",
"url": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3467067",
"url": "https://hackerone.com/reports/3467067"
}
],
"release_date": "2026-04-16T17:27:48.944000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader"
}
]
}
RHSA-2026:8838
Vulnerability from csaf_redhat - Published: 2026-04-17 23:15 - Updated: 2026-04-21 13:32Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
A SMTP command injection flaw was found in the way Ruby's Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.
It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.
A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory.
It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.
Ruby's Net::FTP module trusted the IP address included in the FTP server's response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.
A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.
A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.
A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).
A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:\n\nruby4.0:\n * ruby4.0-4.0.0-33.3.hum1 (aarch64, x86_64)\n * ruby4.0-bundled-gems-4.0.0-33.3.hum1 (aarch64, x86_64)\n * ruby4.0-default-gems-4.0.0-33.3.hum1 (noarch)\n * ruby4.0-devel-4.0.0-33.3.hum1 (aarch64, x86_64)\n * ruby4.0-doc-4.0.0-33.3.hum1 (noarch)\n * ruby4.0-libs-4.0.0-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-bigdecimal-4.0.1-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-bundler-4.0.3-33.3.hum1 (noarch)\n * rubygem4.0-devel-4.0.3-33.3.hum1 (noarch)\n * rubygem4.0-io-console-0.8.2-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-irb-1.16.0-33.3.hum1 (noarch)\n * rubygem4.0-json-2.18.0-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-minitest-6.0.0-33.3.hum1 (noarch)\n * rubygem4.0-power_assert-3.0.1-33.3.hum1 (noarch)\n * rubygem4.0-psych-5.3.1-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-racc-1.8.1-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-rake-13.3.1-33.3.hum1 (noarch)\n * rubygem4.0-rbs-3.10.0-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-rdoc-7.0.3-33.3.hum1 (noarch)\n * rubygem4.0-rexml-3.4.4-33.3.hum1 (noarch)\n * rubygem4.0-rss-0.3.2-33.3.hum1 (noarch)\n * rubygem4.0-rubygems-4.0.3-33.3.hum1 (noarch)\n * rubygem4.0-test-unit-3.7.5-33.3.hum1 (noarch)\n * rubygem4.0-typeprof-0.31.1-33.3.hum1 (noarch)\n * ruby4.0-4.0.0-33.3.hum1.src (src)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8838",
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27820",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3905",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3657",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3656",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3655",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-27282",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-31810",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-16254",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-8780",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-14064",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-10784",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-9096",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8090",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8080",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-6438",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-4975",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2013-1821",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2012-5371",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-4815",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-1891",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-28756",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-28739",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-41819",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-28965",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2020-25613",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8838.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-21T13:32:51+00:00",
"generator": {
"date": "2026-04-21T13:32:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8838",
"initial_release_date": "2026-04-17T23:15:06+00:00",
"revision_history": [
{
"date": "2026-04-17T23:15:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-21T02:52:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-21T13:32:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@aarch64",
"product": {
"name": "ruby4-0-main@aarch64",
"product_id": "ruby4-0-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0@4.0.0-33.3.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@src",
"product": {
"name": "ruby4-0-main@src",
"product_id": "ruby4-0-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0@4.0.0-33.3.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@x86_64",
"product": {
"name": "ruby4-0-main@x86_64",
"product_id": "ruby4-0-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0@4.0.0-33.3.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@noarch",
"product": {
"name": "ruby4-0-main@noarch",
"product_id": "ruby4-0-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0-default-gems@4.0.0-33.3.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@aarch64"
},
"product_reference": "ruby4-0-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@noarch"
},
"product_reference": "ruby4-0-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@src"
},
"product_reference": "ruby4-0-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@x86_64"
},
"product_reference": "ruby4-0-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1891",
"discovery_date": "2008-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443829"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick CGI source disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1891\n\nThe risks associated with fixing this flaw outweigh the benefits of the fix. Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "RHBZ#443829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891"
}
],
"release_date": "2008-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: WEBrick CGI source disclosure"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
},
{
"acknowledgments": [
{
"names": [
"oCERT"
]
}
],
"cve": "CVE-2011-4815",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750564"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "RHBZ#750564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-5371",
"discovery_date": "2012-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875236"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "RHBZ#875236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5371",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371"
}
],
"release_date": "2012-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"cve": "CVE-2014-4975",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2014-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1118158"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: off-by-one stack-based buffer overflow in the encodes() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "RHBZ#1118158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: off-by-one stack-based buffer overflow in the encodes() function"
},
{
"cve": "CVE-2014-6438",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2015-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490845"
}
],
"notes": [
{
"category": "description",
"text": "The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe parsing of long strings via decode_www_form_component method",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "RHBZ#1490845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/",
"url": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/"
}
],
"release_date": "2014-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unsafe parsing of long strings via decode_www_form_component method"
},
{
"cve": "CVE-2014-8080",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1157709"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML billion laughs attack via parameter entity expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "RHBZ#1157709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8080",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/",
"url": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/"
}
],
"release_date": "2014-10-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML billion laughs attack via parameter entity expansion"
},
{
"acknowledgments": [
{
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-8090",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1159927"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML incomplete fix for CVE-2014-8080",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "RHBZ#1159927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/",
"url": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/"
}
],
"release_date": "2014-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML incomplete fix for CVE-2014-8080"
},
{
"cve": "CVE-2015-9096",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2017-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1461846"
}
],
"notes": [
{
"category": "description",
"text": "A SMTP command injection flaw was found in the way Ruby\u0027s Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "RHBZ#1461846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-9096",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096"
}
],
"release_date": "2017-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP"
},
{
"cve": "CVE-2017-10784",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2017-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1492012"
}
],
"notes": [
{
"category": "description",
"text": "It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections 3. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "RHBZ#1492012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
}
],
"release_date": "2017-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick"
},
{
"cve": "CVE-2017-14064",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487552"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter\u0027s heap memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary heap exposure during a JSON.generate call",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, and 6. These versions do not include the JSON module.\n\nThis issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "RHBZ#1487552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/"
}
],
"release_date": "2017-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Arbitrary heap exposure during a JSON.generate call"
},
{
"cve": "CVE-2018-8780",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561949"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "RHBZ#1561949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
}
],
"release_date": "2018-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "workaround",
"details": "It is possible to test for presence of the NULL byte manually prior to call a Dir method with an untrusted string.",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir"
},
{
"cve": "CVE-2019-16254",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789556"
}
],
"notes": [
{
"category": "description",
"text": "Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: HTTP response splitting in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "RHBZ#1789556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254"
}
],
"release_date": "2019-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: HTTP response splitting in WEBrick"
},
{
"cve": "CVE-2020-25613",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883623"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Potential HTTP request smuggling in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "RHBZ#1883623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25613"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/",
"url": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/"
}
],
"release_date": "2020-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Potential HTTP request smuggling in WEBrick"
},
{
"cve": "CVE-2021-28965",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947526"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: XML round-trip vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "RHBZ#1947526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947526"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965"
}
],
"release_date": "2021-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: XML round-trip vulnerability in REXML"
},
{
"cve": "CVE-2021-31810",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980126"
}
],
"notes": [
{
"category": "description",
"text": "Ruby\u0027s Net::FTP module trusted the IP address included in the FTP server\u0027s response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat CloudForms 5.11 does not ship Ruby or RubyGem net-ftp and thus not affected by the flaw. RubyGem net-sftp (Ruby implementation of Secure File Transfer Protocol) which product ship is different library component from the affected package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "RHBZ#1980126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980126"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/",
"url": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host"
},
{
"cve": "CVE-2021-41819",
"discovery_date": "2021-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2026757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Cookie prefix spoofing in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "RHBZ#2026757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819"
}
],
"release_date": "2021-11-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Cookie prefix spoofing in CGI::Cookie.parse"
},
{
"cve": "CVE-2022-28739",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2075687"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Buffer overrun in String-to-Float conversion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "RHBZ#2075687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075687"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/",
"url": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"
}
],
"release_date": "2022-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Buffer overrun in String-to-Float conversion"
},
{
"cve": "CVE-2023-28756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184061"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: ReDoS vulnerability in Time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "RHBZ#2184061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/",
"url": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"
}
],
"release_date": "2023-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: ReDoS vulnerability in Time"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276810"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary memory address read vulnerability with Regex search",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-27282 vulnerability in Ruby is classified as a Moderate severity issue due to its potential to expose arbitrary heap data relative to the start of the text through the Ruby regex compiler. While the vulnerability allows the extraction of pointers and sensitive strings from memory, its exploitation requires attacker-supplied data to be provided to the regex compiler. This means that an attacker would need to craft specific input to exploit the issue, limiting the ease of exploitation compared to vulnerabilities that might be remotely exploitable without user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "RHBZ#2276810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276810"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/",
"url": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"
}
],
"release_date": "2024-04-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Arbitrary memory address read vulnerability with Regex search"
},
{
"cve": "CVE-2026-27820",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-16T18:00:53.206650+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2459002"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A buffer overflow vulnerability exists in the Zlib::GzipReader component of the Ruby zlib interface. This flaw, caused by insufficient memory capacity during data manipulation, could lead to memory corruption and system instability. This vulnerability is considered of a Moderate severity this happens because the high complexity to exploit, additionally the attacker may have not full control over the data is being corrupted or exfiltrated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "RHBZ#2459002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w",
"url": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3467067",
"url": "https://hackerone.com/reports/3467067"
}
],
"release_date": "2026-04-16T17:27:48.944000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader"
}
]
}
RHSA-2008_0897
Vulnerability from csaf_redhat - Published: 2008-10-21 14:52 - Updated: 2024-11-22 02:16Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix several security issues are now available\nfor Red Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an interpreted scripting language for quick and easy\nobject-oriented programming.\n\nThe Ruby DNS resolver library, resolv.rb, used predictable transaction IDs\nand a fixed source port when sending DNS requests. A remote attacker could\nuse this flaw to spoof a malicious reply to a DNS query. (CVE-2008-3905)\n\nRuby\u0027s XML document parsing module (REXML) was prone to a denial of service\nattack via XML documents with large XML entity definitions recursion. A\nspecially-crafted XML file could cause a Ruby application using the REXML\nmodule to use an excessive amount of CPU and memory. (CVE-2008-3790)\n\nAn insufficient \"taintness\" check flaw was discovered in Ruby\u0027s DL module,\nwhich provides direct access to the C language functions. An attacker could\nuse this flaw to bypass intended safe-level restrictions by calling\nexternal C functions with the arguments from an untrusted tainted inputs.\n(CVE-2008-3657)\n\nA denial of service flaw was discovered in WEBrick, Ruby\u0027s HTTP server\ntoolkit. A remote attacker could send a specially-crafted HTTP request to a\nWEBrick server that would cause the server to use an excessive amount of\nCPU time. (CVE-2008-3656)\n\nA number of flaws were found in the safe-level restrictions in Ruby. It\nwas possible for an attacker to create a carefully crafted malicious script\nthat can allow the bypass of certain safe-level restrictions. (CVE-2008-3655)\n\nA denial of service flaw was found in Ruby\u0027s regular expression engine. If\na Ruby script tried to process a large amount of data via a regular\nexpression, it could cause Ruby to enter an infinite-loop and crash.\n(CVE-2008-3443)\n\nUsers of ruby should upgrade to these updated packages, which contain\nbackported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2008:0897",
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "external",
"summary": "460134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460134"
},
{
"category": "external",
"summary": "461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0897.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T02:16:58+00:00",
"generator": {
"date": "2024-11-22T02:16:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2008:0897",
"initial_release_date": "2008-10-21T14:52:00+00:00",
"revision_history": [
{
"date": "2008-10-21T14:52:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-10-21T10:43:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T02:16:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.ia64",
"product_id": "irb-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.ia64",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.ia64",
"product_id": "ruby-0:1.8.1-7.el4_7.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_2.5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.ia64",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.ia64",
"product_id": "ruby-0:1.8.5-5.el5_2.5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.i386",
"product_id": "irb-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.i386",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.i386",
"product_id": "ruby-0:1.8.1-7.el4_7.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_2.5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.i386",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.i386",
"product_id": "ruby-0:1.8.5-5.el5_2.5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "irb-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"product_id": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_2.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"product_id": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.src",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.src",
"product_id": "ruby-0:1.8.1-7.el4_7.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.src",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.src",
"product_id": "ruby-0:1.8.5-5.el5_2.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.ppc",
"product_id": "irb-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.ppc",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.ppc",
"product_id": "ruby-0:1.8.1-7.el4_7.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_2.5?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.ppc",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.ppc",
"product_id": "ruby-0:1.8.5-5.el5_2.5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.s390x",
"product_id": "irb-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.s390x",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390x",
"product_id": "ruby-0:1.8.1-7.el4_7.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-5.el5_2.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-5.el5_2.5.s390x",
"product": {
"name": "ruby-0:1.8.5-5.el5_2.5.s390x",
"product_id": "ruby-0:1.8.5-5.el5_2.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-5.el5_2.5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "irb-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "irb-0:1.8.1-7.el4_7.1.s390",
"product_id": "irb-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/irb@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.1-7.el4_7.1.s390",
"product": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390",
"product_id": "ruby-0:1.8.1-7.el4_7.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.1-7.el4_7.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"product": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"product_id": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-5.el5_2.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"product_id": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-5.el5_2.5?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"product": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"product_id": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-5.el5_2.5?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:irb-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:irb-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "irb-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:irb-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "irb-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.src"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.src"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.src"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1145",
"discovery_date": "2008-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "435902"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) \"..%5c\" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: webrick directory traversal",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1145"
},
{
"category": "external",
"summary": "RHBZ#435902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=435902"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1145",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1145"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1145",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1145"
}
],
"release_date": "2008-03-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: webrick directory traversal"
},
{
"cve": "CVE-2008-3443",
"discovery_date": "2008-08-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "459266"
}
],
"notes": [
{
"category": "description",
"text": "The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3443"
},
{
"category": "external",
"summary": "RHBZ#459266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=459266"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3443"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3443"
}
],
"release_date": "2008-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3790",
"discovery_date": "2008-08-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "460134"
}
],
"notes": [
{
"category": "description",
"text": "The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an \"XML entity explosion.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: DoS vulnerability in the REXML module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3790"
},
{
"category": "external",
"summary": "RHBZ#460134",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=460134"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3790",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3790"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3790",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3790"
}
],
"release_date": "2008-08-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: DoS vulnerability in the REXML module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2008-10-21T14:52:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:irb-0:1.8.1-7.el4_7.1.i386",
"4AS:irb-0:1.8.1-7.el4_7.1.ia64",
"4AS:irb-0:1.8.1-7.el4_7.1.ppc",
"4AS:irb-0:1.8.1-7.el4_7.1.s390",
"4AS:irb-0:1.8.1-7.el4_7.1.s390x",
"4AS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-0:1.8.1-7.el4_7.1.src",
"4AS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4AS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.i386",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:irb-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390",
"4Desktop:irb-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:irb-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.src",
"4Desktop:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4Desktop:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4ES:irb-0:1.8.1-7.el4_7.1.i386",
"4ES:irb-0:1.8.1-7.el4_7.1.ia64",
"4ES:irb-0:1.8.1-7.el4_7.1.ppc",
"4ES:irb-0:1.8.1-7.el4_7.1.s390",
"4ES:irb-0:1.8.1-7.el4_7.1.s390x",
"4ES:irb-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-0:1.8.1-7.el4_7.1.src",
"4ES:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4ES:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"4WS:irb-0:1.8.1-7.el4_7.1.i386",
"4WS:irb-0:1.8.1-7.el4_7.1.ia64",
"4WS:irb-0:1.8.1-7.el4_7.1.ppc",
"4WS:irb-0:1.8.1-7.el4_7.1.s390",
"4WS:irb-0:1.8.1-7.el4_7.1.s390x",
"4WS:irb-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-0:1.8.1-7.el4_7.1.src",
"4WS:ruby-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-debuginfo-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-devel-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-docs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.ppc64",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-libs-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-mode-0:1.8.1-7.el4_7.1.x86_64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.i386",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ia64",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.ppc",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.s390x",
"4WS:ruby-tcltk-0:1.8.1-7.el4_7.1.x86_64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.src",
"5Client-Workstation:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client-Workstation:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-0:1.8.5-5.el5_2.5.src",
"5Client:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Client:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-0:1.8.5-5.el5_2.5.src",
"5Server:ruby-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-debuginfo-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-devel-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-docs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-irb-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.ppc64",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-libs-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-mode-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-rdoc-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-ri-0:1.8.5-5.el5_2.5.x86_64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.i386",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ia64",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.ppc",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.s390x",
"5Server:ruby-tcltk-0:1.8.5-5.el5_2.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2008:0897"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
}
]
}
GSD-2008-3655
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2008-3655",
"description": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"id": "GSD-2008-3655",
"references": [
"https://www.suse.com/security/cve/CVE-2008-3655.html",
"https://www.debian.org/security/2008/dsa-1651",
"https://www.debian.org/security/2008/dsa-1652",
"https://access.redhat.com/errata/RHSA-2008:0897",
"https://access.redhat.com/errata/RHSA-2008:0896",
"https://access.redhat.com/errata/RHSA-2008:0895",
"https://linux.oracle.com/cve/CVE-2008-3655.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2008-3655"
],
"details": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"id": "GSD-2008-3655",
"modified": "2023-12-13T01:23:05.181187Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3655",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "31430",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31430"
},
{
"name": "1020656",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020656"
},
{
"name": "31697",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/31697"
},
{
"name": "USN-651-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/651-1/"
},
{
"name": "http://support.apple.com/kb/HT3549",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3549"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264",
"refsource": "CONFIRM",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264"
},
{
"name": "DSA-1652",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1652"
},
{
"name": "FEDORA-2008-8736",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html"
},
{
"name": "oval:org.mitre.oval:def:11602",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602"
},
{
"name": "35074",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35074"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm"
},
{
"name": "DSA-1651",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2008/dsa-1651"
},
{
"name": "ruby-safelevel-security-bypass(44369)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44369"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "RHSA-2008:0895",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0895.html"
},
{
"name": "30644",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30644"
},
{
"name": "RHSA-2008:0897",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0897.html"
},
{
"name": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/",
"refsource": "CONFIRM",
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"name": "32219",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32219"
},
{
"name": "TA09-133A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "32255",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32255"
},
{
"name": "ADV-2009-1297",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "20080831 rPSA-2008-0264-1 ruby",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/495884/100/0/threaded"
},
{
"name": "32371",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32371"
},
{
"name": "32165",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32165"
},
{
"name": "GLSA-200812-17",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"name": "33178",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/33178"
},
{
"name": "ADV-2008-2334",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"name": "32372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32372"
},
{
"name": "FEDORA-2008-8738",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"name": "32256",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32256"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.8.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3655"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401",
"refsource": "CONFIRM",
"tags": [],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"name": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/",
"refsource": "CONFIRM",
"tags": [
"Exploit"
],
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"name": "1020656",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1020656"
},
{
"name": "31697",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31697"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264",
"refsource": "CONFIRM",
"tags": [],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264"
},
{
"name": "30644",
"refsource": "BID",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/30644"
},
{
"name": "DSA-1651",
"refsource": "DEBIAN",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2008/dsa-1651"
},
{
"name": "32255",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32255"
},
{
"name": "32256",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32256"
},
{
"name": "DSA-1652",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2008/dsa-1652"
},
{
"name": "33178",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33178"
},
{
"name": "GLSA-200812-17",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"name": "31430",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31430"
},
{
"name": "32219",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32219"
},
{
"name": "32165",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32165"
},
{
"name": "FEDORA-2008-8738",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html"
},
{
"name": "FEDORA-2008-8736",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html"
},
{
"name": "RHSA-2008:0895",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0895.html"
},
{
"name": "RHSA-2008:0897",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2008-0897.html"
},
{
"name": "32372",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32372"
},
{
"name": "32371",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32371"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "http://support.apple.com/kb/HT3549",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT3549"
},
{
"name": "35074",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35074"
},
{
"name": "TA09-133A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "ADV-2009-1297",
"refsource": "VUPEN",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "ADV-2008-2334",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"name": "ruby-safelevel-security-bypass(44369)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44369"
},
{
"name": "oval:org.mitre.oval:def:11602",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602"
},
{
"name": "USN-651-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/651-1/"
},
{
"name": "20080831 rPSA-2008-0264-1 ruby",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/495884/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-11T20:48Z",
"publishedDate": "2008-08-13T01:41Z"
}
}
}
GHSA-P524-PPF2-W36W
Vulnerability from github – Published: 2022-05-02 00:02 – Updated: 2025-04-09 03:57Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
{
"affected": [],
"aliases": [
"CVE-2008-3655"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2008-08-13T01:41:00Z",
"severity": "HIGH"
},
"details": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"id": "GHSA-p524-ppf2-w36w",
"modified": "2025-04-09T03:57:31Z",
"published": "2022-05-02T00:02:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44369"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/651-1"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html"
},
{
"type": "WEB",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31430"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/31697"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32165"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32219"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32255"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32256"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32371"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/32372"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/33178"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35074"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3549"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1651"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2008/dsa-1652"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0895.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0897.html"
},
{
"type": "WEB",
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/495884/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/30644"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1020656"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1297"
}
],
"schema_version": "1.4.0",
"severity": []
}
FKIE_CVE-2008-3655
Vulnerability from fkie_nvd - Published: 2008-08-13 01:41 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401 | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | ||
| cve@mitre.org | http://secunia.com/advisories/31430 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/31697 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/32165 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/32219 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/32255 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/32256 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/32371 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/32372 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/33178 | Vendor Advisory | |
| cve@mitre.org | http://secunia.com/advisories/35074 | Vendor Advisory | |
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-200812-17.xml | ||
| cve@mitre.org | http://support.apple.com/kb/HT3549 | ||
| cve@mitre.org | http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm | ||
| cve@mitre.org | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264 | ||
| cve@mitre.org | http://www.debian.org/security/2008/dsa-1651 | Patch | |
| cve@mitre.org | http://www.debian.org/security/2008/dsa-1652 | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0895.html | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2008-0897.html | ||
| cve@mitre.org | http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/ | Exploit | |
| cve@mitre.org | http://www.securityfocus.com/archive/1/495884/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/bid/30644 | Exploit, Patch | |
| cve@mitre.org | http://www.securitytracker.com/id?1020656 | ||
| cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA09-133A.html | US Government Resource | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2008/2334 | Vendor Advisory | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/1297 | Patch, Vendor Advisory | |
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/44369 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602 | ||
| cve@mitre.org | https://usn.ubuntu.com/651-1/ | ||
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html | ||
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31430 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/31697 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32165 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32219 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32255 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32256 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32371 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/32372 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33178 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35074 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200812-17.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3549 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1651 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2008/dsa-1652 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0895.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2008-0897.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/ | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/495884/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/30644 | Exploit, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1020656 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA09-133A.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/2334 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1297 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/44369 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/651-1/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html |
| Vendor | Product | Version | |
|---|---|---|---|
| ruby-lang | ruby | * | |
| ruby-lang | ruby | 1.6.8 | |
| ruby-lang | ruby | 1.8.0 | |
| ruby-lang | ruby | 1.8.1 | |
| ruby-lang | ruby | 1.8.1 | |
| ruby-lang | ruby | 1.8.2 | |
| ruby-lang | ruby | 1.8.2 | |
| ruby-lang | ruby | 1.8.2 | |
| ruby-lang | ruby | 1.8.2 | |
| ruby-lang | ruby | 1.8.3 | |
| ruby-lang | ruby | 1.8.3 | |
| ruby-lang | ruby | 1.8.3 | |
| ruby-lang | ruby | 1.8.3 | |
| ruby-lang | ruby | 1.8.4 | |
| ruby-lang | ruby | 1.8.4 | |
| ruby-lang | ruby | 1.8.4 | |
| ruby-lang | ruby | 1.8.4 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.5 | |
| ruby-lang | ruby | 1.8.6 | |
| ruby-lang | ruby | 1.8.6 | |
| ruby-lang | ruby | 1.8.6 | |
| ruby-lang | ruby | 1.8.6 | |
| ruby-lang | ruby | 1.8.6 | |
| ruby-lang | ruby | 1.8.6 | |
| ruby-lang | ruby | 1.8.6 | |
| ruby-lang | ruby | 1.8.6 | |
| ruby-lang | ruby | 1.8.6 | |
| ruby-lang | ruby | 1.8.6 | |
| ruby-lang | ruby | 1.8.7 | |
| ruby-lang | ruby | 1.8.7 | |
| ruby-lang | ruby | 1.8.7 | |
| ruby-lang | ruby | 1.8.7 | |
| ruby-lang | ruby | 1.8.7 | |
| ruby-lang | ruby | 1.8.7 | |
| ruby-lang | ruby | 1.8.7 | |
| ruby-lang | ruby | 1.8.7 | |
| ruby-lang | ruby | 1.9.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9721AB68-8002-4F85-98BC-0E6FDF7CDF6C",
"versionEndIncluding": "1.8.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "46086C6A-9068-4959-BEE7-4D76BDEA3962",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16BDFA5C-35BE-4B7E-BD2D-C28B095F62E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31160797-6920-4BA1-B355-1CCD1FCDBFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.1:-9:*:*:*:*:*:*",
"matchCriteriaId": "BC306E85-66D8-4384-BBC3-92DC99C85FC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A5675C37-39EF-41EF-9A53-3FCE4CF23820",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview2:*:*:*:*:*:*",
"matchCriteriaId": "39609530-0A81-481E-BDA4-5A98327EAD11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview3:*:*:*:*:*:*",
"matchCriteriaId": "C19ADE91-4D9E-43ED-A605-E504B9090119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.2:preview4:*:*:*:*:*:*",
"matchCriteriaId": "D89E3027-C2ED-4CC6-86F5-1B791576B6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "46F29ADA-E6DC-456F-9E63-C56C68EF7E5C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview1:*:*:*:*:*:*",
"matchCriteriaId": "57B1C113-682E-4F7D-BCF0-E30C446C4AC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview2:*:*:*:*:*:*",
"matchCriteriaId": "4BAF9471-B532-4194-AB3C-5AA28432FF27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.3:preview3:*:*:*:*:*:*",
"matchCriteriaId": "51BE9728-A5FE-486A-8DB9-711E46243132",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC1B910-C0FA-4943-92B1-597842E84015",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview1:*:*:*:*:*:*",
"matchCriteriaId": "A78ECCA9-6F07-4A63-8BF7-8D40F2439552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview2:*:*:*:*:*:*",
"matchCriteriaId": "14513719-4ED8-4EAB-B4D8-29849B868BA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.4:preview3:*:*:*:*:*:*",
"matchCriteriaId": "92E3814D-BEEA-4E46-9CED-9D8059727D14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p11:*:*:*:*:*:*",
"matchCriteriaId": "CA7D3F32-EFB7-4628-9328-36C6A306B399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p113:*:*:*:*:*:*",
"matchCriteriaId": "D1A95E9F-AEC5-4AF9-B7D9-52DDDECB7E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p115:*:*:*:*:*:*",
"matchCriteriaId": "9328DE73-420B-4280-85A4-ABEFC4679676",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p12:*:*:*:*:*:*",
"matchCriteriaId": "0F382FBD-6163-4A5B-AEB3-A15A843329F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p2:*:*:*:*:*:*",
"matchCriteriaId": "4399121F-9BC7-4A67-8B0B-ED3B94A16D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:p35:*:*:*:*:*:*",
"matchCriteriaId": "BFE61EB9-2544-4E48-B313-63A99F4F5241",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview1:*:*:*:*:*:*",
"matchCriteriaId": "6122187F-2371-429A-971B-419B4ACE8E18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview2:*:*:*:*:*:*",
"matchCriteriaId": "8A42425D-FF21-4863-B43D-EE100DBE6BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview3:*:*:*:*:*:*",
"matchCriteriaId": "06512108-020D-4D71-8F60-6AA2052D7D35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview4:*:*:*:*:*:*",
"matchCriteriaId": "E2E152A5-F625-4061-AD8C-4CFA085B674F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.5:preview5:*:*:*:*:*:*",
"matchCriteriaId": "756F5247-658C-412C-ACBF-CBE987DF748A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "876B2575-4F81-4A70-9A88-9BEE44649626",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p110:*:*:*:*:*:*",
"matchCriteriaId": "DF02372D-FD0B-453F-821E-1E0BA7900711",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p111:*:*:*:*:*:*",
"matchCriteriaId": "0A6ED369-E564-4D4F-9E23-A8125194EAD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p114:*:*:*:*:*:*",
"matchCriteriaId": "ACC0DB90-C072-4BCB-9082-94394F547D35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p230:*:*:*:*:*:*",
"matchCriteriaId": "4D7ED62B-4D88-46A4-A0A3-BD37E66A5211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p286:*:*:*:*:*:*",
"matchCriteriaId": "072A0C3C-9F47-4DC7-96EA-7980B45429DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:p36:*:*:*:*:*:*",
"matchCriteriaId": "FB0372E4-FE3E-49CD-AF55-E2E4518D34F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview1:*:*:*:*:*:*",
"matchCriteriaId": "04579340-B53F-47B5-99C9-B647AAA3D303",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview2:*:*:*:*:*:*",
"matchCriteriaId": "9D7F4162-108A-470B-8E6B-C009E8C56AEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:preview3:*:*:*:*:*:*",
"matchCriteriaId": "73AB0545-3D8D-4623-8381-D71DA44E3B5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2D86FC99-3521-4E22-8FD3-65CEB05A6342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7:p17:*:*:*:*:*:*",
"matchCriteriaId": "84A291B0-EABD-4572-B8E2-2457DBAEDC92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7:p22:*:*:*:*:*:*",
"matchCriteriaId": "1FE05F3A-A8B5-45EE-BF52-D55E2768F890",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7:p71:*:*:*:*:*:*",
"matchCriteriaId": "0C6D66E2-3E10-4DEA-9E6B-53A5DE78AFCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview1:*:*:*:*:*:*",
"matchCriteriaId": "4E37786B-5336-4182-A1E3-801BDB6F61EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview2:*:*:*:*:*:*",
"matchCriteriaId": "349D014E-223A-46A7-8334-543DB330C215",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview3:*:*:*:*:*:*",
"matchCriteriaId": "550EC183-43A1-4A63-A23C-A48C1F078451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7:preview4:*:*:*:*:*:*",
"matchCriteriaId": "0ACECF59-AA88-4B5C-A671-83842C9CF072",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52179EC7-CAF0-42AA-A21A-7105E10CA122",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3."
},
{
"lang": "es",
"value": "Ruby versiones 1.8.5 y anteriores, versiones 1.8.6 hasta 1.8.6-p286, versiones 1.8.7 hasta 1.8.7-p71, y versiones 1.9 hasta r18423, no restringe apropiadamente el acceso a variables y m\u00e9todos cr\u00edticos en varios niveles seguros, lo que permite a los atacantes dependiendo del contexto omitir las restricciones de acceso previstas por medio de (1) untrace_var, (2) $PROGRAM_NAME, y (3) syslog en nivel seguro 4 y (4) m\u00e9todos no confiables en los niveles seguros 1 a 3."
}
],
"id": "CVE-2008-3655",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-08-13T01:41:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31430"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31697"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32165"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32219"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32255"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32256"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32371"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32372"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33178"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35074"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT3549"
},
{
"source": "cve@mitre.org",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm"
},
{
"source": "cve@mitre.org",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2008/dsa-1651"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2008/dsa-1652"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0895.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0897.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/495884/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/30644"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1020656"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44369"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602"
},
{
"source": "cve@mitre.org",
"url": "https://usn.ubuntu.com/651-1/"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494401"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31430"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/31697"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32165"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32219"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32255"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32256"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32371"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/32372"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/33178"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35074"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-200812-17.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3549"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2008-424.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0264"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.debian.org/security/2008/dsa-1651"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2008/dsa-1652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0895.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2008-0897.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.ruby-lang.org/en/news/2008/08/08/multiple-vulnerabilities-in-ruby/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/495884/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.securityfocus.com/bid/30644"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1020656"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2008/2334"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44369"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11602"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/651-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00259.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00299.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTA-2009-AVI-186
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Apple Mac OS X. L'exploitation de certaines d'entre elles peut conduire à l'exécution de code arbitraire à distance sur le système vulnérable.
Description
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Apple Mac OS X. Elles touchent divers composants et services installés comme CFNetworks (manipulation des échanges HTTP), CoreGraphics (manipulation de fichiers PDF), Help Viewer (manipulation de l'URI help:), QuickDraw Manager (manipulation d'images PICT), Safari (manipulation de l'URI feed:), OpenSSL, PHP, WebKit, X11, etc.
L'exploitation de certaines de ces vulnérabilités peut conduire à l'exécution de code arbitraire à distance sur le système vulnérable.
Solution
Se référer au bulletin de sécurité 2009-002 de Apple pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | Mac OS X Server version 10.4.11 ainsi que celles antérieures. | ||
| Apple | N/A | Mac OS X Server version 10.5.6 ainsi que celles antérieures ; | ||
| Apple | N/A | Mac OS X version 10.5.6 ainsi que celles antérieures ; | ||
| Apple | N/A | Mac OS X version 10.4.11 ainsi que celles antérieures ; |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X Server version 10.4.11 ainsi que celles ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server version 10.5.6 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X version 10.5.6 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X version 10.4.11 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. Elles touchent divers composants et\nservices install\u00e9s comme CFNetworks (manipulation des \u00e9changes HTTP),\nCoreGraphics (manipulation de fichiers PDF), Help Viewer (manipulation\nde l\u0027URI help:), QuickDraw Manager (manipulation d\u0027images PICT), Safari\n(manipulation de l\u0027URI feed:), OpenSSL, PHP, WebKit, X11, etc.\n\nL\u0027exploitation de certaines de ces vuln\u00e9rabilit\u00e9s peut conduire \u00e0\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le syst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 2009-002 de Apple pour l\u0027obtention\ndes correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0160"
},
{
"name": "CVE-2009-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0147"
},
{
"name": "CVE-2008-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3652"
},
{
"name": "CVE-2009-0846",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0846"
},
{
"name": "CVE-2008-5557",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5557"
},
{
"name": "CVE-2009-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0847"
},
{
"name": "CVE-2009-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0155"
},
{
"name": "CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"name": "CVE-2009-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0153"
},
{
"name": "CVE-2008-1517",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1517"
},
{
"name": "CVE-2008-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3660"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0456"
},
{
"name": "CVE-2009-0943",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0943"
},
{
"name": "CVE-2009-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0157"
},
{
"name": "CVE-2008-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3651"
},
{
"name": "CVE-2009-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0010"
},
{
"name": "CVE-2009-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0040"
},
{
"name": "CVE-2008-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1382"
},
{
"name": "CVE-2004-1185",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1185"
},
{
"name": "CVE-2009-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0148"
},
{
"name": "CVE-2008-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2371"
},
{
"name": "CVE-2008-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3658"
},
{
"name": "CVE-2008-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3443"
},
{
"name": "CVE-2008-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3659"
},
{
"name": "CVE-2009-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0025"
},
{
"name": "CVE-2008-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3863"
},
{
"name": "CVE-2008-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2383"
},
{
"name": "CVE-2008-3530",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3530"
},
{
"name": "CVE-2009-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0149"
},
{
"name": "CVE-2009-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0154"
},
{
"name": "CVE-2008-3790",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3790"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2008-2829",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2829"
},
{
"name": "CVE-2009-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0165"
},
{
"name": "CVE-2009-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0144"
},
{
"name": "CVE-2009-0162",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0162"
},
{
"name": "CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"name": "CVE-2004-1186",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1186"
},
{
"name": "CVE-2008-2665",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2665"
},
{
"name": "CVE-2009-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0114"
},
{
"name": "CVE-2008-2666",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2666"
},
{
"name": "CVE-2009-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0021"
},
{
"name": "CVE-2009-0519",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0519"
},
{
"name": "CVE-2009-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0145"
},
{
"name": "CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"name": "CVE-2009-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0146"
},
{
"name": "CVE-2009-0844",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0844"
},
{
"name": "CVE-2009-0942",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0942"
},
{
"name": "CVE-2009-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0152"
},
{
"name": "CVE-2009-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0156"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2009-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0150"
},
{
"name": "CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
},
{
"name": "CVE-2007-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2754"
},
{
"name": "CVE-2009-0845",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0845"
},
{
"name": "CVE-2009-0944",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0944"
},
{
"name": "CVE-2009-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0164"
},
{
"name": "CVE-2009-0520",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0520"
},
{
"name": "CVE-2008-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2939"
},
{
"name": "CVE-2009-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0161"
},
{
"name": "CVE-2008-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0158"
},
{
"name": "CVE-2004-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1184"
},
{
"name": "CVE-2008-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5077"
},
{
"name": "CVE-2006-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0747"
},
{
"name": "CVE-2009-0945",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0945"
}
],
"links": [
{
"title": "D\u00e9tails concernant la mise \u00e0 jour de s\u00e9curit\u00e9 2009-002 du 12 mai 2009\u00a0:",
"url": "http://support.apple.com/kb/HT3397"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 61798 du 12 mai 2009 :",
"url": "http://docs.info.apple.com/article.html?artnum=61798"
},
{
"title": "D\u00e9tails concernant la mise \u00e0 jour de s\u00e9curit\u00e9 2009-002 du 12 mai 2009\u00a0:",
"url": "http://support.apple.com/kb/HT3549"
}
],
"reference": "CERTA-2009-AVI-186",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. L\u0027exploitation de certaines d\u0027entre elles\npeut conduire \u00e0 l\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le syst\u00e8me\nvuln\u00e9rable.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 2009-002 Apple du 12 mai 2009",
"url": null
}
]
}
CERTA-2009-AVI-186
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Apple Mac OS X. L'exploitation de certaines d'entre elles peut conduire à l'exécution de code arbitraire à distance sur le système vulnérable.
Description
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Apple Mac OS X. Elles touchent divers composants et services installés comme CFNetworks (manipulation des échanges HTTP), CoreGraphics (manipulation de fichiers PDF), Help Viewer (manipulation de l'URI help:), QuickDraw Manager (manipulation d'images PICT), Safari (manipulation de l'URI feed:), OpenSSL, PHP, WebKit, X11, etc.
L'exploitation de certaines de ces vulnérabilités peut conduire à l'exécution de code arbitraire à distance sur le système vulnérable.
Solution
Se référer au bulletin de sécurité 2009-002 de Apple pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | Mac OS X Server version 10.4.11 ainsi que celles antérieures. | ||
| Apple | N/A | Mac OS X Server version 10.5.6 ainsi que celles antérieures ; | ||
| Apple | N/A | Mac OS X version 10.5.6 ainsi que celles antérieures ; | ||
| Apple | N/A | Mac OS X version 10.4.11 ainsi que celles antérieures ; |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X Server version 10.4.11 ainsi que celles ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server version 10.5.6 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X version 10.5.6 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X version 10.4.11 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. Elles touchent divers composants et\nservices install\u00e9s comme CFNetworks (manipulation des \u00e9changes HTTP),\nCoreGraphics (manipulation de fichiers PDF), Help Viewer (manipulation\nde l\u0027URI help:), QuickDraw Manager (manipulation d\u0027images PICT), Safari\n(manipulation de l\u0027URI feed:), OpenSSL, PHP, WebKit, X11, etc.\n\nL\u0027exploitation de certaines de ces vuln\u00e9rabilit\u00e9s peut conduire \u00e0\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le syst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 2009-002 de Apple pour l\u0027obtention\ndes correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0160"
},
{
"name": "CVE-2009-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0147"
},
{
"name": "CVE-2008-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3652"
},
{
"name": "CVE-2009-0846",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0846"
},
{
"name": "CVE-2008-5557",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5557"
},
{
"name": "CVE-2009-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0847"
},
{
"name": "CVE-2009-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0155"
},
{
"name": "CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"name": "CVE-2009-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0153"
},
{
"name": "CVE-2008-1517",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1517"
},
{
"name": "CVE-2008-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3660"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0456"
},
{
"name": "CVE-2009-0943",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0943"
},
{
"name": "CVE-2009-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0157"
},
{
"name": "CVE-2008-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3651"
},
{
"name": "CVE-2009-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0010"
},
{
"name": "CVE-2009-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0040"
},
{
"name": "CVE-2008-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1382"
},
{
"name": "CVE-2004-1185",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1185"
},
{
"name": "CVE-2009-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0148"
},
{
"name": "CVE-2008-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2371"
},
{
"name": "CVE-2008-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3658"
},
{
"name": "CVE-2008-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3443"
},
{
"name": "CVE-2008-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3659"
},
{
"name": "CVE-2009-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0025"
},
{
"name": "CVE-2008-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3863"
},
{
"name": "CVE-2008-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2383"
},
{
"name": "CVE-2008-3530",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3530"
},
{
"name": "CVE-2009-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0149"
},
{
"name": "CVE-2009-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0154"
},
{
"name": "CVE-2008-3790",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3790"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2008-2829",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2829"
},
{
"name": "CVE-2009-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0165"
},
{
"name": "CVE-2009-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0144"
},
{
"name": "CVE-2009-0162",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0162"
},
{
"name": "CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"name": "CVE-2004-1186",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1186"
},
{
"name": "CVE-2008-2665",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2665"
},
{
"name": "CVE-2009-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0114"
},
{
"name": "CVE-2008-2666",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2666"
},
{
"name": "CVE-2009-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0021"
},
{
"name": "CVE-2009-0519",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0519"
},
{
"name": "CVE-2009-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0145"
},
{
"name": "CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"name": "CVE-2009-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0146"
},
{
"name": "CVE-2009-0844",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0844"
},
{
"name": "CVE-2009-0942",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0942"
},
{
"name": "CVE-2009-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0152"
},
{
"name": "CVE-2009-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0156"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2009-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0150"
},
{
"name": "CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
},
{
"name": "CVE-2007-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2754"
},
{
"name": "CVE-2009-0845",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0845"
},
{
"name": "CVE-2009-0944",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0944"
},
{
"name": "CVE-2009-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0164"
},
{
"name": "CVE-2009-0520",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0520"
},
{
"name": "CVE-2008-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2939"
},
{
"name": "CVE-2009-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0161"
},
{
"name": "CVE-2008-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0158"
},
{
"name": "CVE-2004-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1184"
},
{
"name": "CVE-2008-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5077"
},
{
"name": "CVE-2006-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0747"
},
{
"name": "CVE-2009-0945",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0945"
}
],
"links": [
{
"title": "D\u00e9tails concernant la mise \u00e0 jour de s\u00e9curit\u00e9 2009-002 du 12 mai 2009\u00a0:",
"url": "http://support.apple.com/kb/HT3397"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 61798 du 12 mai 2009 :",
"url": "http://docs.info.apple.com/article.html?artnum=61798"
},
{
"title": "D\u00e9tails concernant la mise \u00e0 jour de s\u00e9curit\u00e9 2009-002 du 12 mai 2009\u00a0:",
"url": "http://support.apple.com/kb/HT3549"
}
],
"reference": "CERTA-2009-AVI-186",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. L\u0027exploitation de certaines d\u0027entre elles\npeut conduire \u00e0 l\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le syst\u00e8me\nvuln\u00e9rable.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 2009-002 Apple du 12 mai 2009",
"url": null
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.