RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the gem owner command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.
{
"binaries": [
{
"binary_version": "1.9.3.484-2ubuntu1.12",
"binary_name": "libruby1.9.1"
},
{
"binary_version": "1.9.3.484-2ubuntu1.12",
"binary_name": "libtcltk-ruby1.9.1"
},
{
"binary_version": "1.9.3.484-2ubuntu1.12",
"binary_name": "ri1.9.1"
},
{
"binary_version": "1.9.3.484-2ubuntu1.12",
"binary_name": "ruby1.9.1"
},
{
"binary_version": "1.9.3.484-2ubuntu1.12",
"binary_name": "ruby1.9.1-dev"
},
{
"binary_version": "1.9.3.484-2ubuntu1.12",
"binary_name": "ruby1.9.1-examples"
},
{
"binary_version": "1.9.3.484-2ubuntu1.12",
"binary_name": "ruby1.9.1-full"
},
{
"binary_version": "1.9.3.484-2ubuntu1.12",
"binary_name": "ruby1.9.3"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "2.0.0.484-1ubuntu2.10",
"binary_name": "libruby2.0"
},
{
"binary_version": "2.0.0.484-1ubuntu2.10",
"binary_name": "ruby2.0"
},
{
"binary_version": "2.0.0.484-1ubuntu2.10",
"binary_name": "ruby2.0-dev"
},
{
"binary_version": "2.0.0.484-1ubuntu2.10",
"binary_name": "ruby2.0-tcltk"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "2.3.1-2~16.04.7",
"binary_name": "libruby2.3"
},
{
"binary_version": "2.3.1-2~16.04.7",
"binary_name": "ruby2.3"
},
{
"binary_version": "2.3.1-2~16.04.7",
"binary_name": "ruby2.3-dev"
},
{
"binary_version": "2.3.1-2~16.04.7",
"binary_name": "ruby2.3-tcltk"
}
],
"availability": "No subscription required"
}