7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
Ruby is vulnerable to denial of service(DoS) attacks. This is due to negative size in tar header which may result in an infinite loop, could cause application to crash.
blog.rubygems.org/2018/02/15/2.7.6-released.html
lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
access.redhat.com/errata/RHSA-2018:3729
access.redhat.com/errata/RHSA-2018:3730
access.redhat.com/errata/RHSA-2018:3731
access.redhat.com/errata/RHSA-2019:2028
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1650591
github.com/rubygems/rubygems/commit/92e98bf8f810bd812f919120d4832df51bc25d83
lists.debian.org/debian-lts-announce/2018/04/msg00000.html
lists.debian.org/debian-lts-announce/2018/04/msg00001.html
lists.debian.org/debian-lts-announce/2018/04/msg00023.html
lists.debian.org/debian-lts-announce/2018/07/msg00012.html
lists.debian.org/debian-lts-announce/2019/05/msg00028.html
usn.ubuntu.com/3621-1/
www.debian.org/security/2018/dsa-4219
www.debian.org/security/2018/dsa-4259
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P