RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
{
"binaries": [
{
"binary_version": "2.0.0.484-1ubuntu2.10",
"binary_name": "libruby2.0"
},
{
"binary_version": "2.0.0.484-1ubuntu2.10",
"binary_name": "ruby2.0"
},
{
"binary_version": "2.0.0.484-1ubuntu2.10",
"binary_name": "ruby2.0-dev"
},
{
"binary_version": "2.0.0.484-1ubuntu2.10",
"binary_name": "ruby2.0-tcltk"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "2.3.1-2~16.04.6",
"binary_name": "libruby2.3"
},
{
"binary_version": "2.3.1-2~16.04.6",
"binary_name": "ruby2.3"
},
{
"binary_version": "2.3.1-2~16.04.6",
"binary_name": "ruby2.3-dev"
},
{
"binary_version": "2.3.1-2~16.04.6",
"binary_name": "ruby2.3-tcltk"
}
],
"availability": "No subscription required"
}