An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. Upstream patch: https://bugs.ruby-lang.org/attachments/7669 References: https://www.ruby-lang.org/en/news/2019/03/05/multiple-vulnerabilities-in-rubygems/ https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
Created rubygems tracking bugs for this issue: Affects: fedora-all [bug 1692530]
Flaws are in gemcutter_utilities.rb One example: ```ruby if block_given? then yield response else say response.body ```
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:1148 https://access.redhat.com/errata/RHSA-2019:1148
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:1150 https://access.redhat.com/errata/RHSA-2019:1150
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1235 https://access.redhat.com/errata/RHSA-2019:1235
This issue has been addressed in the following products: CloudForms Management Engine 5.10 Via RHSA-2019:1429 https://access.redhat.com/errata/RHSA-2019:1429
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2020:2769 https://access.redhat.com/errata/RHSA-2020:2769