UBUNTU-CVE-2012-2125

Source
https://ubuntu.com/security/CVE-2012-2125
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2012/UBUNTU-CVE-2012-2125.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2012-2125
Upstream
Related
  • USN-1582-1
  • USN-1583-1
Published
2012-04-20T00:00:00Z
Modified
2025-09-08T16:42:57Z
Severity
  • Ubuntu - low
Summary
[none]
Details

RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.

References

Affected packages

Ubuntu:Pro:14.04:LTS / jruby

Package

Name
jruby
Purl
pkg:deb/ubuntu/jruby@1.5.6-9+deb8u2build0.14.04.1~esm2?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.5.6-5ubuntu1
1.5.6-6
1.5.6-7
1.5.6-9+deb8u2build0.14.04.1~esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.5.6-9+deb8u2build0.14.04.1~esm2",
            "binary_name": "jruby"
        }
    ]
}