Sha256: 83637f5e3abb224807f330fdd042a61d0fc9213c720343a457bbda0ed1cb4962
Contents?: true
Size: 591 Bytes
Versions: 2
Compression:
Stored size: 591 Bytes
Contents
--- library: rubygems cve: 2019-8324 url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html title: Installing a malicious gem may lead to arbitrary code execution date: 2019-03-05 description: | An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. unaffected_versions: - "< 2.6" patched_versions: - ">= 3.0.3" - "~> 2.7.9"
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
bundler-budit-0.6.2 | data/ruby-advisory-db/libraries/rubygems/CVE-2019-8324.yml |
bundler-budit-0.6.1 | data/ruby-advisory-db/libraries/rubygems/CVE-2019-8324.yml |