Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-1821 (GCVE-0-2013-1821)
Vulnerability from cvelistv5 – Published: 2013-04-09 21:00 – Updated: 2024-08-06 15:13- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T15:13:33.271Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2013:0612",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0612.html"
},
{
"name": "MDVSA-2013:124",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:124"
},
{
"name": "openSUSE-SU-2013:0603",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"
},
{
"name": "SSA:2013-075-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE",
"x_transferred"
],
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862"
},
{
"name": "52783",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/52783"
},
{
"name": "DSA-2738",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2013/dsa-2738"
},
{
"name": "openSUSE-SU-2013:0614",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
},
{
"name": "USN-1780-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1780-1"
},
{
"name": "58141",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/58141"
},
{
"name": "52902",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/52902"
},
{
"name": "[oss-security] 20130306 CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2013/03/06/5"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
},
{
"name": "SUSE-SU-2013:0609",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
},
{
"name": "DSA-2809",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2013/dsa-2809"
},
{
"name": "RHSA-2013:1028",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
},
{
"name": "RHSA-2013:0611",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0611.html"
},
{
"name": "RHSA-2013:1147",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"name": "SUSE-SU-2013:0647",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-02-22T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-12-06T13:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2013:0612",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0612.html"
},
{
"name": "MDVSA-2013:124",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:124"
},
{
"name": "openSUSE-SU-2013:0603",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"
},
{
"name": "SSA:2013-075-01",
"tags": [
"vendor-advisory",
"x_refsource_SLACKWARE"
],
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862"
},
{
"name": "52783",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/52783"
},
{
"name": "DSA-2738",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2013/dsa-2738"
},
{
"name": "openSUSE-SU-2013:0614",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
},
{
"name": "USN-1780-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1780-1"
},
{
"name": "58141",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/58141"
},
{
"name": "52902",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/52902"
},
{
"name": "[oss-security] 20130306 CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2013/03/06/5"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
},
{
"name": "SUSE-SU-2013:0609",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
},
{
"name": "DSA-2809",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2013/dsa-2809"
},
{
"name": "RHSA-2013:1028",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
},
{
"name": "RHSA-2013:0611",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0611.html"
},
{
"name": "RHSA-2013:1147",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"name": "SUSE-SU-2013:0647",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1821",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:0612",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0612.html"
},
{
"name": "MDVSA-2013:124",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:124"
},
{
"name": "openSUSE-SU-2013:0603",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"
},
{
"name": "SSA:2013-075-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862"
},
{
"name": "52783",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52783"
},
{
"name": "DSA-2738",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2738"
},
{
"name": "openSUSE-SU-2013:0614",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html"
},
{
"name": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384",
"refsource": "CONFIRM",
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
},
{
"name": "USN-1780-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1780-1"
},
{
"name": "58141",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58141"
},
{
"name": "52902",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52902"
},
{
"name": "[oss-security] 20130306 CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/06/5"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=914716",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"name": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"refsource": "CONFIRM",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
},
{
"name": "SUSE-SU-2013:0609",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
},
{
"name": "DSA-2809",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2809"
},
{
"name": "RHSA-2013:1028",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
},
{
"name": "RHSA-2013:0611",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0611.html"
},
{
"name": "RHSA-2013:1147",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"name": "SUSE-SU-2013:0647",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-1821",
"datePublished": "2013-04-09T21:00:00.000Z",
"dateReserved": "2013-02-19T00:00:00.000Z",
"dateUpdated": "2024-08-06T15:13:33.271Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2013-1821",
"date": "2026-04-24",
"epss": "0.20672",
"percentile": "0.95604"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:*:p385:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.9.3\", \"matchCriteriaId\": \"AA8C0F8E-4C21-4181-84A5-D17E70D19D9A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9237145-35F8-4E05-B730-77C0F386E5B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C78BB1D8-0505-484D-B824-1AA219F8B247\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5178D04D-1C29-4353-8987-559AA07443EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0535DC9-EB0E-4745-80AC-4A020DF26E38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*\", \"matchCriteriaId\": \"94F5AA37-B466-4E2E-B217-5119BADDD87B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DF0F0F5-4022-4837-9B40-4B1127732CC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3848B08-85C2-4AAD-AA33-CCEB80EF5B32\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7927D40-2A3A-43AD-99F6-CE61882A1FF4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA406EC6-6CA5-40A6-A879-AA8940CBEF07\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90E0471D-1323-4E67-B66C-DEBF3BBAEEAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B03B7561-A854-4EFA-9E4E-CFC4EEAE4EE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"285A3431-BDFE-40C5-92CD-B18217757C23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D66B32CB-AC49-4A1C-85ED-6389F27CB319\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.\"}, {\"lang\": \"es\", \"value\": \"lib/rexml/text.rb en el analizador REXML en Ruby anterior a 1.9.3-p392, permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (consumo de memoria o ca\\u00edda de la aplicaci\\u00f3n) a trav\\u00e9s de nodos de texto manipulados en un documento XML. Aka como ataque XML Entity Expansion (XEE).\"}]",
"evaluatorImpact": "Per: http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/\r\n\r\n\"Affected versions\r\n\r\n All ruby 1.9 versions prior to ruby 1.9.3 patchlevel 392\r\n All ruby 2.0 versions prior to ruby 2.0.0 patchlevel 0\r\n prior to trunk revision 39384\"\r\n",
"id": "CVE-2013-1821",
"lastModified": "2024-11-21T01:50:27.493",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2013-04-09T21:55:01.113",
"references": "[{\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0611.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0612.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1028.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1147.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/52783\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/52902\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2013/dsa-2738\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2013/dsa-2809\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2013:124\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2013/03/06/5\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/58141\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1780-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=914716\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0611.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-0612.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1028.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2013-1147.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/52783\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/52902\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2013/dsa-2738\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2013/dsa-2809\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2013:124\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2013/03/06/5\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/58141\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-1780-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=914716\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2013-1821\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-04-09T21:55:01.113\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.\"},{\"lang\":\"es\",\"value\":\"lib/rexml/text.rb en el analizador REXML en Ruby anterior a 1.9.3-p392, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria o ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de nodos de texto manipulados en un documento XML. Aka como ataque XML Entity Expansion (XEE).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:*:p385:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.9.3\",\"matchCriteriaId\":\"AA8C0F8E-4C21-4181-84A5-D17E70D19D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9237145-35F8-4E05-B730-77C0F386E5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C78BB1D8-0505-484D-B824-1AA219F8B247\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5178D04D-1C29-4353-8987-559AA07443EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0535DC9-EB0E-4745-80AC-4A020DF26E38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*\",\"matchCriteriaId\":\"94F5AA37-B466-4E2E-B217-5119BADDD87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DF0F0F5-4022-4837-9B40-4B1127732CC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3848B08-85C2-4AAD-AA33-CCEB80EF5B32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7927D40-2A3A-43AD-99F6-CE61882A1FF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA406EC6-6CA5-40A6-A879-AA8940CBEF07\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90E0471D-1323-4E67-B66C-DEBF3BBAEEAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B03B7561-A854-4EFA-9E4E-CFC4EEAE4EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"285A3431-BDFE-40C5-92CD-B18217757C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D66B32CB-AC49-4A1C-85ED-6389F27CB319\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0611.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0612.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1028.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1147.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/52783\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/52902\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2738\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2809\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:124\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/03/06/5\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/58141\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1780-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=914716\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0611.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0612.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-1147.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/52783\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/52902\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2738\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2013/dsa-2809\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2013/03/06/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/58141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-1780-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=914716\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"evaluatorImpact\":\"Per: http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/\\r\\n\\r\\n\\\"Affected versions\\r\\n\\r\\n All ruby 1.9 versions prior to ruby 1.9.3 patchlevel 392\\r\\n All ruby 2.0 versions prior to ruby 2.0.0 patchlevel 0\\r\\n prior to trunk revision 39384\\\"\\r\\n\"}}"
}
}
RHSA-2013:0611
Vulnerability from csaf_redhat - Published: 2013-03-07 18:50 - Updated: 2026-04-20 21:35lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nIt was discovered that Ruby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nAll users of Ruby are advised to upgrade to these updated packages, which\ncontain backported patches to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0611",
"url": "https://access.redhat.com/errata/RHSA-2013:0611"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0611.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2026-04-20T21:35:07+00:00",
"generator": {
"date": "2026-04-20T21:35:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2013:0611",
"initial_release_date": "2013-03-07T18:50:00+00:00",
"revision_history": [
{
"date": "2013-03-07T18:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-03-07T18:56:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-20T21:35:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-mode-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-mode-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-irb-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-irb-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-ri-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-ri-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-docs-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-docs-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.s390",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.s390",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.s390",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.s390",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-mode-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-mode-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-irb-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-irb-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-ri-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-ri-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-docs-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-docs-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-tcltk-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-mode-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-mode-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-irb-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-irb-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-ri-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-ri-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-rdoc-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-docs-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-docs-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-tcltk-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-29.el5_9?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-mode-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-mode-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-irb-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-irb-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-ri-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-ri-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-docs-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-docs-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-mode-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-mode-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-irb-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-irb-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-ri-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-ri-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-docs-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-docs-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc64",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc64",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc64",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc64",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.src",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.src",
"product_id": "ruby-0:1.8.5-29.el5_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.src"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.src",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.ppc64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.s390",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-docs-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-irb-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.ppc64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.s390",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-mode-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-ri-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.src",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-07T18:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.src",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0611"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.src",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
}
]
}
RHSA-2026:8838
Vulnerability from csaf_redhat - Published: 2026-04-17 23:15 - Updated: 2026-04-21 13:32Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
A SMTP command injection flaw was found in the way Ruby's Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.
It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.
A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory.
It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.
Ruby's Net::FTP module trusted the IP address included in the FTP server's response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.
A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.
A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.
A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).
A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:\n\nruby4.0:\n * ruby4.0-4.0.0-33.3.hum1 (aarch64, x86_64)\n * ruby4.0-bundled-gems-4.0.0-33.3.hum1 (aarch64, x86_64)\n * ruby4.0-default-gems-4.0.0-33.3.hum1 (noarch)\n * ruby4.0-devel-4.0.0-33.3.hum1 (aarch64, x86_64)\n * ruby4.0-doc-4.0.0-33.3.hum1 (noarch)\n * ruby4.0-libs-4.0.0-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-bigdecimal-4.0.1-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-bundler-4.0.3-33.3.hum1 (noarch)\n * rubygem4.0-devel-4.0.3-33.3.hum1 (noarch)\n * rubygem4.0-io-console-0.8.2-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-irb-1.16.0-33.3.hum1 (noarch)\n * rubygem4.0-json-2.18.0-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-minitest-6.0.0-33.3.hum1 (noarch)\n * rubygem4.0-power_assert-3.0.1-33.3.hum1 (noarch)\n * rubygem4.0-psych-5.3.1-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-racc-1.8.1-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-rake-13.3.1-33.3.hum1 (noarch)\n * rubygem4.0-rbs-3.10.0-33.3.hum1 (aarch64, x86_64)\n * rubygem4.0-rdoc-7.0.3-33.3.hum1 (noarch)\n * rubygem4.0-rexml-3.4.4-33.3.hum1 (noarch)\n * rubygem4.0-rss-0.3.2-33.3.hum1 (noarch)\n * rubygem4.0-rubygems-4.0.3-33.3.hum1 (noarch)\n * rubygem4.0-test-unit-3.7.5-33.3.hum1 (noarch)\n * rubygem4.0-typeprof-0.31.1-33.3.hum1 (noarch)\n * ruby4.0-4.0.0-33.3.hum1.src (src)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:8838",
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27820",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3905",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3657",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3656",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3655",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-27282",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-31810",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-16254",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-8780",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-14064",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-10784",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-9096",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8090",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8080",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-6438",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-4975",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2013-1821",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2012-5371",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-4815",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-1891",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-28756",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-28739",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-41819",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-28965",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2020-25613",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_8838.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-21T13:32:51+00:00",
"generator": {
"date": "2026-04-21T13:32:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:8838",
"initial_release_date": "2026-04-17T23:15:06+00:00",
"revision_history": [
{
"date": "2026-04-17T23:15:06+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-21T02:52:53+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-21T13:32:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@aarch64",
"product": {
"name": "ruby4-0-main@aarch64",
"product_id": "ruby4-0-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0@4.0.0-33.3.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@src",
"product": {
"name": "ruby4-0-main@src",
"product_id": "ruby4-0-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0@4.0.0-33.3.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@x86_64",
"product": {
"name": "ruby4-0-main@x86_64",
"product_id": "ruby4-0-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0@4.0.0-33.3.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby4-0-main@noarch",
"product": {
"name": "ruby4-0-main@noarch",
"product_id": "ruby4-0-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby4.0-default-gems@4.0.0-33.3.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@aarch64"
},
"product_reference": "ruby4-0-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@noarch"
},
"product_reference": "ruby4-0-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@src"
},
"product_reference": "ruby4-0-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby4-0-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby4-0-main@x86_64"
},
"product_reference": "ruby4-0-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1891",
"discovery_date": "2008-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443829"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick CGI source disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1891\n\nThe risks associated with fixing this flaw outweigh the benefits of the fix. Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "RHBZ#443829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891"
}
],
"release_date": "2008-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: WEBrick CGI source disclosure"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
},
{
"acknowledgments": [
{
"names": [
"oCERT"
]
}
],
"cve": "CVE-2011-4815",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750564"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "RHBZ#750564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-5371",
"discovery_date": "2012-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875236"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "RHBZ#875236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5371",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371"
}
],
"release_date": "2012-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"cve": "CVE-2014-4975",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2014-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1118158"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: off-by-one stack-based buffer overflow in the encodes() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "RHBZ#1118158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: off-by-one stack-based buffer overflow in the encodes() function"
},
{
"cve": "CVE-2014-6438",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2015-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490845"
}
],
"notes": [
{
"category": "description",
"text": "The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe parsing of long strings via decode_www_form_component method",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "RHBZ#1490845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/",
"url": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/"
}
],
"release_date": "2014-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unsafe parsing of long strings via decode_www_form_component method"
},
{
"cve": "CVE-2014-8080",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1157709"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML billion laughs attack via parameter entity expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "RHBZ#1157709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8080",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/",
"url": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/"
}
],
"release_date": "2014-10-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML billion laughs attack via parameter entity expansion"
},
{
"acknowledgments": [
{
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-8090",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1159927"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML incomplete fix for CVE-2014-8080",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "RHBZ#1159927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/",
"url": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/"
}
],
"release_date": "2014-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML incomplete fix for CVE-2014-8080"
},
{
"cve": "CVE-2015-9096",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2017-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1461846"
}
],
"notes": [
{
"category": "description",
"text": "A SMTP command injection flaw was found in the way Ruby\u0027s Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "RHBZ#1461846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-9096",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096"
}
],
"release_date": "2017-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP"
},
{
"cve": "CVE-2017-10784",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2017-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1492012"
}
],
"notes": [
{
"category": "description",
"text": "It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections 3. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "RHBZ#1492012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
}
],
"release_date": "2017-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick"
},
{
"cve": "CVE-2017-14064",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487552"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter\u0027s heap memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary heap exposure during a JSON.generate call",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, and 6. These versions do not include the JSON module.\n\nThis issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "RHBZ#1487552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/"
}
],
"release_date": "2017-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Arbitrary heap exposure during a JSON.generate call"
},
{
"cve": "CVE-2018-8780",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561949"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "RHBZ#1561949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
}
],
"release_date": "2018-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "workaround",
"details": "It is possible to test for presence of the NULL byte manually prior to call a Dir method with an untrusted string.",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir"
},
{
"cve": "CVE-2019-16254",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789556"
}
],
"notes": [
{
"category": "description",
"text": "Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: HTTP response splitting in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "RHBZ#1789556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254"
}
],
"release_date": "2019-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: HTTP response splitting in WEBrick"
},
{
"cve": "CVE-2020-25613",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883623"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Potential HTTP request smuggling in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "RHBZ#1883623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25613"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/",
"url": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/"
}
],
"release_date": "2020-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Potential HTTP request smuggling in WEBrick"
},
{
"cve": "CVE-2021-28965",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947526"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: XML round-trip vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "RHBZ#1947526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947526"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965"
}
],
"release_date": "2021-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: XML round-trip vulnerability in REXML"
},
{
"cve": "CVE-2021-31810",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980126"
}
],
"notes": [
{
"category": "description",
"text": "Ruby\u0027s Net::FTP module trusted the IP address included in the FTP server\u0027s response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat CloudForms 5.11 does not ship Ruby or RubyGem net-ftp and thus not affected by the flaw. RubyGem net-sftp (Ruby implementation of Secure File Transfer Protocol) which product ship is different library component from the affected package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "RHBZ#1980126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980126"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/",
"url": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host"
},
{
"cve": "CVE-2021-41819",
"discovery_date": "2021-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2026757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Cookie prefix spoofing in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "RHBZ#2026757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819"
}
],
"release_date": "2021-11-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Cookie prefix spoofing in CGI::Cookie.parse"
},
{
"cve": "CVE-2022-28739",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2075687"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Buffer overrun in String-to-Float conversion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "RHBZ#2075687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075687"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/",
"url": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"
}
],
"release_date": "2022-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Buffer overrun in String-to-Float conversion"
},
{
"cve": "CVE-2023-28756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184061"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: ReDoS vulnerability in Time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "RHBZ#2184061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/",
"url": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"
}
],
"release_date": "2023-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: ReDoS vulnerability in Time"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276810"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary memory address read vulnerability with Regex search",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-27282 vulnerability in Ruby is classified as a Moderate severity issue due to its potential to expose arbitrary heap data relative to the start of the text through the Ruby regex compiler. While the vulnerability allows the extraction of pointers and sensitive strings from memory, its exploitation requires attacker-supplied data to be provided to the regex compiler. This means that an attacker would need to craft specific input to exploit the issue, limiting the ease of exploitation compared to vulnerabilities that might be remotely exploitable without user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "RHBZ#2276810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276810"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/",
"url": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"
}
],
"release_date": "2024-04-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Arbitrary memory address read vulnerability with Regex search"
},
{
"cve": "CVE-2026-27820",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-16T18:00:53.206650+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2459002"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A buffer overflow vulnerability exists in the Zlib::GzipReader component of the Ruby zlib interface. This flaw, caused by insufficient memory capacity during data manipulation, could lead to memory corruption and system instability. This vulnerability is considered of a Moderate severity this happens because the high complexity to exploit, additionally the attacker may have not full control over the data is being corrupted or exfiltrated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "RHBZ#2459002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w",
"url": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3467067",
"url": "https://hackerone.com/reports/3467067"
}
],
"release_date": "2026-04-16T17:27:48.944000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-17T23:15:06+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:8838"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby4-0-main@aarch64",
"Red Hat Hardened Images:ruby4-0-main@noarch",
"Red Hat Hardened Images:ruby4-0-main@src",
"Red Hat Hardened Images:ruby4-0-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader"
}
]
}
RHSA-2013_0612
Vulnerability from csaf_redhat - Published: 2013-03-07 18:53 - Updated: 2024-11-22 06:54The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix two security issues are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nIt was discovered that Ruby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nIt was found that the RHSA-2011:0910 update did not correctly fix the\nCVE-2011-1005 issue, a flaw in the method for translating an exception\nmessage into a string in the Exception class. A remote attacker could use\nthis flaw to bypass safe level 4 restrictions, allowing untrusted (tainted)\ncode to modify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2012-4481)\n\nThe CVE-2012-4481 issue was discovered by Vit Ondruch of Red Hat.\n\nAll users of Ruby are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0612",
"url": "https://access.redhat.com/errata/RHSA-2013:0612"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://rhn.redhat.com/errata/RHSA-2011-0910.html",
"url": "https://rhn.redhat.com/errata/RHSA-2011-0910.html"
},
{
"category": "external",
"summary": "863484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=863484"
},
{
"category": "external",
"summary": "914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0612.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T06:54:33+00:00",
"generator": {
"date": "2024-11-22T06:54:33+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:0612",
"initial_release_date": "2013-03-07T18:53:00+00:00",
"revision_history": [
{
"date": "2013-03-07T18:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-03-07T18:53:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T06:54:33+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.352-10.el6_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.352-10.el6_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.7.352-10.el6_4.src",
"product": {
"name": "ruby-0:1.8.7.352-10.el6_4.src",
"product_id": "ruby-0:1.8.7.352-10.el6_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.352-10.el6_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.352-10.el6_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.352-10.el6_4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Vit Ondruch"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2012-4481",
"discovery_date": "2012-10-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "863484"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Incomplete fix for CVE-2011-1005 for NameError#to_s method when used on objects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4481"
},
{
"category": "external",
"summary": "RHBZ#863484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=863484"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4481",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4481"
}
],
"release_date": "2012-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-07T18:53:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0612"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Incomplete fix for CVE-2011-1005 for NameError#to_s method when used on objects"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-07T18:53:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0612"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
}
]
}
RHSA-2013_0611
Vulnerability from csaf_redhat - Published: 2013-03-07 18:50 - Updated: 2024-11-22 06:54lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nIt was discovered that Ruby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nAll users of Ruby are advised to upgrade to these updated packages, which\ncontain backported patches to resolve this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0611",
"url": "https://access.redhat.com/errata/RHSA-2013:0611"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0611.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2024-11-22T06:54:28+00:00",
"generator": {
"date": "2024-11-22T06:54:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:0611",
"initial_release_date": "2013-03-07T18:50:00+00:00",
"revision_history": [
{
"date": "2013-03-07T18:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-03-07T18:56:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T06:54:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-mode-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-mode-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-irb-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-irb-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-ri-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-ri-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-docs-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-docs-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-29.el5_9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.s390x",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.s390x",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.s390",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.s390",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.s390",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.s390",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-mode-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-mode-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-irb-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-irb-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-ri-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-ri-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-docs-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-docs-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-tcltk-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-29.el5_9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.x86_64",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.x86_64",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-mode-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-mode-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-irb-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-irb-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-ri-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-ri-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-rdoc-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-docs-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-docs-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-29.el5_9?arch=i386"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-29.el5_9.i386",
"product": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.i386",
"product_id": "ruby-tcltk-0:1.8.5-29.el5_9.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-29.el5_9?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-mode-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-mode-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-irb-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-irb-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-ri-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-ri-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-docs-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-docs-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-29.el5_9?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.ia64",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ia64",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-mode-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-mode-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-mode-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-mode@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-irb-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-irb-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-ri-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-ri-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-docs-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-docs-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.5-29.el5_9?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc64",
"product": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc64",
"product_id": "ruby-libs-0:1.8.5-29.el5_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.5-29.el5_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"product_id": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.5-29.el5_9?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc64",
"product": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc64",
"product_id": "ruby-devel-0:1.8.5-29.el5_9.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.5-29.el5_9?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.5-29.el5_9.src",
"product": {
"name": "ruby-0:1.8.5-29.el5_9.src",
"product_id": "ruby-0:1.8.5-29.el5_9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.5-29.el5_9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.src"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.src",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc64"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.ppc64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.s390",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-devel-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-docs-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-docs-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-docs-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-docs-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-docs-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-irb-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-irb-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-irb-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-irb-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-irb-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc64"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.ppc64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.s390",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-libs-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-mode-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-mode-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-mode-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-mode-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-mode-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-mode-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-rdoc-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-ri-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-ri-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-ri-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-ri-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-ri-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.i386"
},
"product_reference": "ruby-tcltk-0:1.8.5-29.el5_9.i386",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ia64"
},
"product_reference": "ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ppc"
},
"product_reference": "ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"relates_to_product_reference": "5Server-5.9.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.5-29.el5_9.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.5-29.el5_9.x86_64",
"relates_to_product_reference": "5Server-5.9.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.src",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-07T18:50:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.src",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0611"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.src",
"5Server-5.9.Z:ruby-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-debuginfo-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-devel-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-docs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-irb-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.ppc64",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-libs-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-mode-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-rdoc-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-ri-0:1.8.5-29.el5_9.x86_64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.i386",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ia64",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.ppc",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.s390x",
"5Server-5.9.Z:ruby-tcltk-0:1.8.5-29.el5_9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
}
]
}
RHSA-2013:0612
Vulnerability from csaf_redhat - Published: 2013-03-07 18:53 - Updated: 2026-04-20 21:35The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated ruby packages that fix two security issues are now available for\nRed Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to do system management tasks.\n\nIt was discovered that Ruby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nIt was found that the RHSA-2011:0910 update did not correctly fix the\nCVE-2011-1005 issue, a flaw in the method for translating an exception\nmessage into a string in the Exception class. A remote attacker could use\nthis flaw to bypass safe level 4 restrictions, allowing untrusted (tainted)\ncode to modify arbitrary, trusted (untainted) strings, which safe level 4\nrestrictions would otherwise prevent. (CVE-2012-4481)\n\nThe CVE-2012-4481 issue was discovered by Vit Ondruch of Red Hat.\n\nAll users of Ruby are advised to upgrade to these updated packages, which\ncontain backported patches to resolve these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:0612",
"url": "https://access.redhat.com/errata/RHSA-2013:0612"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://rhn.redhat.com/errata/RHSA-2011-0910.html",
"url": "https://rhn.redhat.com/errata/RHSA-2011-0910.html"
},
{
"category": "external",
"summary": "863484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=863484"
},
{
"category": "external",
"summary": "914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0612.json"
}
],
"title": "Red Hat Security Advisory: ruby security update",
"tracking": {
"current_release_date": "2026-04-20T21:35:07+00:00",
"generator": {
"date": "2026-04-20T21:35:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2013:0612",
"initial_release_date": "2013-03-07T18:53:00+00:00",
"revision_history": [
{
"date": "2013-03-07T18:53:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-03-07T18:53:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-20T21:35:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.352-10.el6_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"product": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"product_id": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.352-10.el6_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.352-10.el6_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.352-10.el6_4.i686",
"product": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686",
"product_id": "ruby-0:1.8.7.352-10.el6_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.352-10.el6_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-0:1.8.7.352-10.el6_4.src",
"product": {
"name": "ruby-0:1.8.7.352-10.el6_4.src",
"product_id": "ruby-0:1.8.7.352-10.el6_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.352-10.el6_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.352-10.el6_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.352-10.el6_4.s390x",
"product": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x",
"product_id": "ruby-0:1.8.7.352-10.el6_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.352-10.el6_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-tcltk@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-docs@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-ri@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-static@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-rdoc@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-irb@1.8.7.352-10.el6_4?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"product": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"product_id": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby@1.8.7.352-10.el6_4?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=s390"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"product": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"product_id": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-devel@1.8.7.352-10.el6_4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"product": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"product_id": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-debuginfo@1.8.7.352-10.el6_4?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"product": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"product_id": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby-libs@1.8.7.352-10.el6_4?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Client-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.src",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-static-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
},
"product_reference": "ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.4.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Vit Ondruch"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2012-4481",
"discovery_date": "2012-10-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "863484"
}
],
"notes": [
{
"category": "description",
"text": "The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Incomplete fix for CVE-2011-1005 for NameError#to_s method when used on objects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-4481"
},
{
"category": "external",
"summary": "RHBZ#863484",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=863484"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-4481",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4481"
}
],
"release_date": "2012-10-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-07T18:53:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0612"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Incomplete fix for CVE-2011-1005 for NameError#to_s method when used on objects"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-03-07T18:53:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258",
"product_ids": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:0612"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Client-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Client-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6ComputeNode-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6ComputeNode-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Server-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Server-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.src",
"6Workstation-optional-6.4.z:ruby-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-debuginfo-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-devel-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-docs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-irb-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-libs-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-rdoc-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-ri-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-static-0:1.8.7.352-10.el6_4.x86_64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.i686",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.ppc64",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.s390x",
"6Workstation-optional-6.4.z:ruby-tcltk-0:1.8.7.352-10.el6_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
}
]
}
RHSA-2026:7307
Vulnerability from csaf_redhat - Published: 2026-04-09 12:37 - Updated: 2026-04-21 13:32Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
A SMTP command injection flaw was found in the way Ruby's Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.
It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.
A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory.
It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.
Ruby's Net::FTP module trusted the IP address included in the FTP server's response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.
A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.
A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.
A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).
A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7307",
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27820",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3905",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3657",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3656",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3655",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-27282",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-31810",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-16254",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-8780",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-14064",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-10784",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-9096",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8090",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8080",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-6438",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-4975",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2013-1821",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2012-5371",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-4815",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-1891",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-28756",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-28739",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-41819",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-28965",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2020-25613",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7307.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-21T13:32:50+00:00",
"generator": {
"date": "2026-04-21T13:32:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:7307",
"initial_release_date": "2026-04-09T12:37:08+00:00",
"revision_history": [
{
"date": "2026-04-09T12:37:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-21T02:53:01+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-21T13:32:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@aarch64",
"product": {
"name": "ruby3-4-main@aarch64",
"product_id": "ruby3-4-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4@3.4.8-31.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@src",
"product": {
"name": "ruby3-4-main@src",
"product_id": "ruby3-4-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4@3.4.8-31.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@x86_64",
"product": {
"name": "ruby3-4-main@x86_64",
"product_id": "ruby3-4-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4@3.4.8-31.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-4-main@noarch",
"product": {
"name": "ruby3-4-main@noarch",
"product_id": "ruby3-4-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.4-default-gems@3.4.8-31.1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@aarch64"
},
"product_reference": "ruby3-4-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@noarch"
},
"product_reference": "ruby3-4-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@src"
},
"product_reference": "ruby3-4-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-4-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-4-main@x86_64"
},
"product_reference": "ruby3-4-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1891",
"discovery_date": "2008-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443829"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick CGI source disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1891\n\nThe risks associated with fixing this flaw outweigh the benefits of the fix. Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "RHBZ#443829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891"
}
],
"release_date": "2008-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: WEBrick CGI source disclosure"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
},
{
"acknowledgments": [
{
"names": [
"oCERT"
]
}
],
"cve": "CVE-2011-4815",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750564"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "RHBZ#750564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-5371",
"discovery_date": "2012-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875236"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "RHBZ#875236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5371",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371"
}
],
"release_date": "2012-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"cve": "CVE-2014-4975",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2014-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1118158"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: off-by-one stack-based buffer overflow in the encodes() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "RHBZ#1118158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: off-by-one stack-based buffer overflow in the encodes() function"
},
{
"cve": "CVE-2014-6438",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2015-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490845"
}
],
"notes": [
{
"category": "description",
"text": "The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe parsing of long strings via decode_www_form_component method",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "RHBZ#1490845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/",
"url": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/"
}
],
"release_date": "2014-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unsafe parsing of long strings via decode_www_form_component method"
},
{
"cve": "CVE-2014-8080",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1157709"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML billion laughs attack via parameter entity expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "RHBZ#1157709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8080",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/",
"url": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/"
}
],
"release_date": "2014-10-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML billion laughs attack via parameter entity expansion"
},
{
"acknowledgments": [
{
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-8090",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1159927"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML incomplete fix for CVE-2014-8080",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "RHBZ#1159927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/",
"url": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/"
}
],
"release_date": "2014-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML incomplete fix for CVE-2014-8080"
},
{
"cve": "CVE-2015-9096",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2017-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1461846"
}
],
"notes": [
{
"category": "description",
"text": "A SMTP command injection flaw was found in the way Ruby\u0027s Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "RHBZ#1461846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-9096",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096"
}
],
"release_date": "2017-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP"
},
{
"cve": "CVE-2017-10784",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2017-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1492012"
}
],
"notes": [
{
"category": "description",
"text": "It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections 3. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "RHBZ#1492012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
}
],
"release_date": "2017-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick"
},
{
"cve": "CVE-2017-14064",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487552"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter\u0027s heap memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary heap exposure during a JSON.generate call",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, and 6. These versions do not include the JSON module.\n\nThis issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "RHBZ#1487552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/"
}
],
"release_date": "2017-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Arbitrary heap exposure during a JSON.generate call"
},
{
"cve": "CVE-2018-8780",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561949"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "RHBZ#1561949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
}
],
"release_date": "2018-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "workaround",
"details": "It is possible to test for presence of the NULL byte manually prior to call a Dir method with an untrusted string.",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir"
},
{
"cve": "CVE-2019-16254",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789556"
}
],
"notes": [
{
"category": "description",
"text": "Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: HTTP response splitting in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "RHBZ#1789556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254"
}
],
"release_date": "2019-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: HTTP response splitting in WEBrick"
},
{
"cve": "CVE-2020-25613",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883623"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Potential HTTP request smuggling in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "RHBZ#1883623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25613"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/",
"url": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/"
}
],
"release_date": "2020-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Potential HTTP request smuggling in WEBrick"
},
{
"cve": "CVE-2021-28965",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947526"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: XML round-trip vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "RHBZ#1947526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947526"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965"
}
],
"release_date": "2021-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: XML round-trip vulnerability in REXML"
},
{
"cve": "CVE-2021-31810",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980126"
}
],
"notes": [
{
"category": "description",
"text": "Ruby\u0027s Net::FTP module trusted the IP address included in the FTP server\u0027s response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat CloudForms 5.11 does not ship Ruby or RubyGem net-ftp and thus not affected by the flaw. RubyGem net-sftp (Ruby implementation of Secure File Transfer Protocol) which product ship is different library component from the affected package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "RHBZ#1980126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980126"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/",
"url": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host"
},
{
"cve": "CVE-2021-41819",
"discovery_date": "2021-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2026757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Cookie prefix spoofing in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "RHBZ#2026757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819"
}
],
"release_date": "2021-11-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Cookie prefix spoofing in CGI::Cookie.parse"
},
{
"cve": "CVE-2022-28739",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2075687"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Buffer overrun in String-to-Float conversion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "RHBZ#2075687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075687"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/",
"url": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"
}
],
"release_date": "2022-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Buffer overrun in String-to-Float conversion"
},
{
"cve": "CVE-2023-28756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184061"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: ReDoS vulnerability in Time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "RHBZ#2184061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/",
"url": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"
}
],
"release_date": "2023-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: ReDoS vulnerability in Time"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276810"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary memory address read vulnerability with Regex search",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-27282 vulnerability in Ruby is classified as a Moderate severity issue due to its potential to expose arbitrary heap data relative to the start of the text through the Ruby regex compiler. While the vulnerability allows the extraction of pointers and sensitive strings from memory, its exploitation requires attacker-supplied data to be provided to the regex compiler. This means that an attacker would need to craft specific input to exploit the issue, limiting the ease of exploitation compared to vulnerabilities that might be remotely exploitable without user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "RHBZ#2276810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276810"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/",
"url": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"
}
],
"release_date": "2024-04-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Arbitrary memory address read vulnerability with Regex search"
},
{
"cve": "CVE-2026-27820",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-16T18:00:53.206650+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2459002"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A buffer overflow vulnerability exists in the Zlib::GzipReader component of the Ruby zlib interface. This flaw, caused by insufficient memory capacity during data manipulation, could lead to memory corruption and system instability. This vulnerability is considered of a Moderate severity this happens because the high complexity to exploit, additionally the attacker may have not full control over the data is being corrupted or exfiltrated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "RHBZ#2459002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w",
"url": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3467067",
"url": "https://hackerone.com/reports/3467067"
}
],
"release_date": "2026-04-16T17:27:48.944000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:37:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7307"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-4-main@aarch64",
"Red Hat Hardened Images:ruby3-4-main@noarch",
"Red Hat Hardened Images:ruby3-4-main@src",
"Red Hat Hardened Images:ruby3-4-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader"
}
]
}
RHSA-2013_1147
Vulnerability from csaf_redhat - Published: 2013-08-08 17:04 - Updated: 2024-11-22 06:54It was found that Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss SOA Platform 5.3.1 roll up patch 3, which fixes three\nsecurity issues and various bugs, is now available from the Red Hat\nCustomer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss SOA Platform is the next-generation ESB and business process\nautomation infrastructure. Red Hat JBoss SOA Platform allows IT to leverage\nexisting (MoM and EAI), modern (SOA and BPM-Rules), and future (EDA and\nCEP) integration methodologies to dramatically improve business process\nexecution speed and quality.\n\nThis roll up patch serves as a cumulative upgrade for Red Hat JBoss SOA\nPlatform 5.3.1. It includes various bug fixes. The following security\nissues are also fixed with this release:\n\nThe Jakarta Commons HttpClient component did not verify that the server\nhostname matched the domain name in the subject\u0027s Common Name (CN) or\nsubjectAltName field in X.509 certificates. This could allow a\nman-in-the-middle attacker to spoof an SSL server if they had a certificate\nthat was valid for any domain name. (CVE-2012-5783)\n\nA flaw in JRuby\u0027s JSON gem allowed remote attacks by creating different\ntypes of malicious objects. For example, it could initiate a denial of\nservice attack through resource consumption by using a JSON document to\ncreate arbitrary Ruby symbols, which were never garbage collected. It could\nalso be exploited to create internal objects which could allow a SQL\ninjection attack. (CVE-2013-0269)\n\nIt was discovered that JRuby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nNote: Red Hat JBoss SOA Platform only provides JRuby as a dependency of\nthe scripting_chain quickstart example application. The CVE-2013-0269 and\nCVE-2013-1821 flaws are not exposed unless the version of JRuby shipped\nwith that quickstart is used by a deployed, custom application.\n\nRed Hat would like to thank Ruby on Rails upstream for reporting\nCVE-2013-0269. Upstream acknowledges Thomas Hollstegge of Zweitag and Ben\nMurphy as the original reporters of CVE-2013-0269.\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nSOA Platform installation (including its databases, applications,\nconfiguration files, and so on).\n\nAll users of Red Hat JBoss SOA Platform 5.3.1 as provided from the Red\nHat Customer Portal are advised to apply this roll up patch.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1147",
"url": "https://access.redhat.com/errata/RHSA-2013:1147"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=5.3.1+GA",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=5.3.1+GA"
},
{
"category": "external",
"summary": "873317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=873317"
},
{
"category": "external",
"summary": "909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1147.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update",
"tracking": {
"current_release_date": "2024-11-22T06:54:54+00:00",
"generator": {
"date": "2024-11-22T06:54:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:1147",
"initial_release_date": "2013-08-08T17:04:00+00:00",
"revision_history": [
{
"date": "2013-08-08T17:04:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-08-08T17:07:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T06:54:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss SOA Platform 5.3",
"product": {
"name": "Red Hat JBoss SOA Platform 5.3",
"product_id": "Red Hat JBoss SOA Platform 5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Middleware"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-5783",
"discovery_date": "2012-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "873317"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5783"
},
{
"category": "external",
"summary": "RHBZ#873317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=873317"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5783"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-08T17:04:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the Red Hat\nJBoss SOA Platform server by starting the JBoss Application Server\nprocess.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1147"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name"
},
{
"acknowledgments": [
{
"names": [
"Ruby on Rails upstream"
]
},
{
"names": [
"Thomas Hollstegge"
],
"organization": "Zweitag",
"summary": "Acknowledged by upstream."
},
{
"names": [
"Ben Murphy"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-0269",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2013-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "909029"
}
],
"notes": [
{
"category": "description",
"text": "The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka \"Unsafe Object Creation Vulnerability.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-json: Denial of Service and SQL Injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite tools ship RubyGem Json 1.4.6 which is earlier than affected 1.5.5 version however, this version of RubyGem is not affected to the flaw. We may update RubyGem in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0269"
},
{
"category": "external",
"summary": "RHBZ#909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/"
}
],
"release_date": "2013-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-08T17:04:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the Red Hat\nJBoss SOA Platform server by starting the JBoss Application Server\nprocess.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1147"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-json: Denial of Service and SQL Injection"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-08T17:04:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the Red Hat\nJBoss SOA Platform server by starting the JBoss Application Server\nprocess.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1147"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
}
]
}
RHSA-2013:1185
Vulnerability from csaf_redhat - Published: 2013-08-29 23:22 - Updated: 2026-04-20 21:35The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Fuse 6.0.0 patch 2, which fixes several security issues and\nvarious bugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Fuse 6.0.0, based on Apache ServiceMix, provides an\nintegration platform.\n\nRed Hat JBoss Fuse 6.0.0 patch 2 is an update to Red Hat JBoss Fuse 6.0.0\nand includes bug fixes. Refer to the readme file included with the patch\nfiles for information about these fixes.\n\nThe following security issues are also resolved with this update:\n\nA flaw was found in the logging performed during deserialization of the\nBrokerFactory class in Apache OpenJPA. A remote attacker able to supply a\nserialized instance of the BrokerFactory class, which will be deserialized\non a server, could use this flaw to write an executable file to the\nserver\u0027s file system. (CVE-2013-1768)\n\nA flaw in JRuby\u0027s JSON gem allowed remote attacks by creating different\ntypes of malicious objects. For example, it could initiate a denial of\nservice attack through resource consumption by using a JSON document to\ncreate arbitrary Ruby symbols, which were never garbage collected. It could\nalso be exploited to create internal objects which could allow a SQL\ninjection attack. (CVE-2013-0269)\n\nIt was discovered that JRuby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nNote: Red Hat JBoss Fuse 6.0.0 ships JRuby as part of the camel-ruby\ncomponent, which allows users to define Camel routes in Ruby. The default\nuse of JRuby in Red Hat JBoss Fuse 6.0.0 does not appear to expose either\nCVE-2013-0269 or CVE-2013-1821. If the version of JRuby shipped with Red\nHat JBoss Fuse 6.0.0 was used to build a custom application, then these\nflaws could be exposed.\n\nMultiple denial of service flaws were found in the way the Apache CXF StAX\nparser implementation processed certain XML files. If a web service\nutilized the StAX parser, a remote attacker could provide a\nspecially-crafted XML file that, when processed, would lead to excessive\nCPU and memory consumption. (CVE-2013-2160)\n\nRed Hat would like to thank Ruby on Rails upstream for reporting\nCVE-2013-0269, and Andreas Falkenberg of SEC Consult Deutschland GmbH, and\nChristian Mainka, Juraj Somorovsky and Joerg Schwenk of Ruhr-University\nBochum for reporting CVE-2013-2160. Upstream acknowledges Thomas Hollstegge\nof Zweitag and Ben Murphy as the original reporters of CVE-2013-0269.\n\nAll users of Red Hat JBoss Fuse 6.0 as provided from the Red Hat Customer\nPortal are advised to apply this patch.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1185",
"url": "https://access.redhat.com/errata/RHSA-2013:1185"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc",
"url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.0.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.0.0"
},
{
"category": "external",
"summary": "909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "929197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197"
},
{
"category": "external",
"summary": "984034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=984034"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1185.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Fuse 6.0.0 patch 2",
"tracking": {
"current_release_date": "2026-04-20T21:35:09+00:00",
"generator": {
"date": "2026-04-20T21:35:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2013:1185",
"initial_release_date": "2013-08-29T23:22:00+00:00",
"revision_history": [
{
"date": "2013-08-29T23:22:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-08-29T23:27:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-20T21:35:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Fuse 6.0",
"product": {
"name": "Red Hat JBoss Fuse 6.0",
"product_id": "Red Hat JBoss Fuse 6.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_fuse:6.0.0"
}
}
}
],
"category": "product_family",
"name": "Fuse Enterprise Middleware"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ruby on Rails upstream"
]
},
{
"names": [
"Thomas Hollstegge"
],
"organization": "Zweitag",
"summary": "Acknowledged by upstream."
},
{
"names": [
"Ben Murphy"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-0269",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2013-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "909029"
}
],
"notes": [
{
"category": "description",
"text": "The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka \"Unsafe Object Creation Vulnerability.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-json: Denial of Service and SQL Injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite tools ship RubyGem Json 1.4.6 which is earlier than affected 1.5.5 version however, this version of RubyGem is not affected to the flaw. We may update RubyGem in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0269"
},
{
"category": "external",
"summary": "RHBZ#909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/"
}
],
"release_date": "2013-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-29T23:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1185"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Fuse 6.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-json: Denial of Service and SQL Injection"
},
{
"cve": "CVE-2013-1768",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2013-07-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "984034"
}
],
"notes": [
{
"category": "description",
"text": "The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1768"
},
{
"category": "external",
"summary": "RHBZ#984034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=984034"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1768",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1768"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1768",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1768"
}
],
"release_date": "2013-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-29T23:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1185"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Fuse 6.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-29T23:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1185"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Fuse 6.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"acknowledgments": [
{
"names": [
"Andreas Falkenberg"
],
"organization": "SEC Consult Deutschland GmbH"
},
{
"names": [
"Christian Mainka",
"Juraj Somorovsky",
"Joerg Schwenk"
],
"organization": "Ruhr-University Bochum"
}
],
"cve": "CVE-2013-2160",
"discovery_date": "2013-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "929197"
}
],
"notes": [
{
"category": "description",
"text": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-cxf: Multiple denial of service flaws in the StAX parser",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2160"
},
{
"category": "external",
"summary": "RHBZ#929197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160"
},
{
"category": "external",
"summary": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc",
"url": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc"
}
],
"release_date": "2013-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-29T23:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1185"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Fuse 6.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-cxf: Multiple denial of service flaws in the StAX parser"
}
]
}
RHSA-2026:7305
Vulnerability from csaf_redhat - Published: 2026-04-09 12:35 - Updated: 2026-04-21 13:31Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
A SMTP command injection flaw was found in the way Ruby's Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.
It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.
A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory.
It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.
Ruby's Net::FTP module trusted the IP address included in the FTP server's response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.
A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.
A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.
A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).
A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Red Hat Hardened Images RPMs is now available.",
"title": "Topic"
},
{
"category": "general",
"text": "This update includes the following RPMs:",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:7305",
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "external",
"summary": "https://images.redhat.com/",
"url": "https://images.redhat.com/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-27820",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3905",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3657",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3656",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-3655",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-27282",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-31810",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2019-16254",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2018-8780",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-14064",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2017-10784",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2015-9096",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8090",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-8080",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-6438",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2014-4975",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2013-1821",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2012-5371",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2011-4815",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2008-1891",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2023-28756",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-28739",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-41819",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2021-28965",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2020-25613",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_7305.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Hardened Images RPMs bug fix and enhancement update",
"tracking": {
"current_release_date": "2026-04-21T13:31:12+00:00",
"generator": {
"date": "2026-04-21T13:31:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2026:7305",
"initial_release_date": "2026-04-09T12:35:20+00:00",
"revision_history": [
{
"date": "2026-04-09T12:35:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-04-21T02:52:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-21T13:31:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Hardened Images",
"product": {
"name": "Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:hummingbird:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Hardened Images"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@aarch64",
"product": {
"name": "ruby3-3-main@aarch64",
"product_id": "ruby3-3-main@aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3@3.3.10-23.1.hum1?arch=aarch64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-aarch64-rpms"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@src",
"product": {
"name": "ruby3-3-main@src",
"product_id": "ruby3-3-main@src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3@3.3.10-23.1.hum1?arch=src\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-source-rpms"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@x86_64",
"product": {
"name": "ruby3-3-main@x86_64",
"product_id": "ruby3-3-main@x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3@3.3.10-23.1.hum1?arch=x86_64\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby3-3-main@noarch",
"product": {
"name": "ruby3-3-main@noarch",
"product_id": "ruby3-3-main@noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ruby3.3-default-gems@3.3.10-23.1.hum1?arch=noarch\u0026distro=hummingbird-20251124\u0026repository_id=public-hummingbird-x86_64-rpms"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@aarch64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@aarch64"
},
"product_reference": "ruby3-3-main@aarch64",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@noarch as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@noarch"
},
"product_reference": "ruby3-3-main@noarch",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@src as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@src"
},
"product_reference": "ruby3-3-main@src",
"relates_to_product_reference": "Red Hat Hardened Images"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby3-3-main@x86_64 as a component of Red Hat Hardened Images",
"product_id": "Red Hat Hardened Images:ruby3-3-main@x86_64"
},
"product_reference": "ruby3-3-main@x86_64",
"relates_to_product_reference": "Red Hat Hardened Images"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2008-1891",
"discovery_date": "2008-04-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443829"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick CGI source disclosure",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1891\n\nThe risks associated with fixing this flaw outweigh the benefits of the fix. Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1891"
},
{
"category": "external",
"summary": "RHBZ#443829",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443829"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1891"
}
],
"release_date": "2008-04-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: WEBrick CGI source disclosure"
},
{
"cve": "CVE-2008-3655",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458948"
}
],
"notes": [
{
"category": "description",
"text": "Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: multiple insufficient safe mode restrictions",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3655"
},
{
"category": "external",
"summary": "RHBZ#458948",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458948"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3655"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: multiple insufficient safe mode restrictions"
},
{
"cve": "CVE-2008-3656",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458953"
}
],
"notes": [
{
"category": "description",
"text": "Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: WEBrick DoS vulnerability (CPU consumption)",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3656"
},
{
"category": "external",
"summary": "RHBZ#458953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458953"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3656"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: WEBrick DoS vulnerability (CPU consumption)"
},
{
"cve": "CVE-2008-3657",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458966"
}
],
"notes": [
{
"category": "description",
"text": "The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check \"taintness\" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: missing \"taintness\" checks in dl module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3657"
},
{
"category": "external",
"summary": "RHBZ#458966",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458966"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3657"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: missing \"taintness\" checks in dl module"
},
{
"cve": "CVE-2008-3905",
"discovery_date": "2008-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "461495"
}
],
"notes": [
{
"category": "description",
"text": "resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-3905"
},
{
"category": "external",
"summary": "RHBZ#461495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=461495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3905"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3905"
}
],
"release_date": "2008-08-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: use of predictable source port and transaction id in DNS requests done by resolv.rb module"
},
{
"acknowledgments": [
{
"names": [
"oCERT"
]
}
],
"cve": "CVE-2011-4815",
"discovery_date": "2011-11-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "750564"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-4815"
},
{
"category": "external",
"summary": "RHBZ#750564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=750564"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-4815",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4815"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4815"
}
],
"release_date": "2011-12-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: hash table collisions CPU usage DoS (oCERT-2011-003)"
},
{
"cve": "CVE-2012-5371",
"discovery_date": "2012-11-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "875236"
}
],
"notes": [
{
"category": "description",
"text": "Ruby (aka CRuby) 1.9 before 1.9.3-p327 and 2.0 before r37575 computes hash values without properly restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table, as demonstrated by a universal multicollision attack against a variant of the MurmurHash2 algorithm, a different vulnerability than CVE-2011-4815.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Not vulnerable. This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5371"
},
{
"category": "external",
"summary": "RHBZ#875236",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=875236"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5371",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5371"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5371"
}
],
"release_date": "2012-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Murmur hash-flooding DoS flaw in ruby 1.9 (oCERT-2012-001)"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"cve": "CVE-2014-4975",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2014-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1118158"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: off-by-one stack-based buffer overflow in the encodes() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5 and 6.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-4975"
},
{
"category": "external",
"summary": "RHBZ#1118158",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1118158"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-4975",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4975"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4975"
}
],
"release_date": "2014-07-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: off-by-one stack-based buffer overflow in the encodes() function"
},
{
"cve": "CVE-2014-6438",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2015-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1490845"
}
],
"notes": [
{
"category": "description",
"text": "The URI.decode_www_form_component method in Ruby before 1.9.2-p330 allows remote attackers to cause a denial of service (catastrophic regular expression backtracking, resource consumption, or application crash) via a crafted string.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unsafe parsing of long strings via decode_www_form_component method",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6438"
},
{
"category": "external",
"summary": "RHBZ#1490845",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1490845"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6438"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6438"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/",
"url": "https://www.ruby-lang.org/en/news/2014/08/19/ruby-1-9-2-p330-released/"
}
],
"release_date": "2014-08-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unsafe parsing of long strings via decode_www_form_component method"
},
{
"cve": "CVE-2014-8080",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1157709"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML billion laughs attack via parameter entity expansion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8080"
},
{
"category": "external",
"summary": "RHBZ#1157709",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1157709"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8080",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8080"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8080"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/",
"url": "https://www.ruby-lang.org/en/news/2014/10/27/rexml-dos-cve-2014-8080/"
}
],
"release_date": "2014-10-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML billion laughs attack via parameter entity expansion"
},
{
"acknowledgments": [
{
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-8090",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"discovery_date": "2014-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1159927"
}
],
"notes": [
{
"category": "description",
"text": "The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: REXML incomplete fix for CVE-2014-8080",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat JBoss SOA Platform 5 is now in Maintenance Support phase receiving only qualified Important and Critical impact security fixes; and Red Hat JBoss SOA Platform 4.3 is now in Extended Life Support phase receiving only Critical impact security fixes. This issue has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware Product Life Cycle: https://access.redhat.com/support/policy/updates/jboss_notes/",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-8090"
},
{
"category": "external",
"summary": "RHBZ#1159927",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1159927"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-8090",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8090"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/",
"url": "https://www.ruby-lang.org/en/news/2014/11/13/rexml-dos-cve-2014-8090/"
}
],
"release_date": "2014-11-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: REXML incomplete fix for CVE-2014-8080"
},
{
"cve": "CVE-2015-9096",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2017-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1461846"
}
],
"notes": [
{
"category": "description",
"text": "A SMTP command injection flaw was found in the way Ruby\u0027s Net::SMTP module handled CRLF sequences in certain SMTP commands. An attacker could potentially use this flaw to inject SMTP commands in a SMTP session in order to facilitate phishing attacks or spam campaigns.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2015-9096"
},
{
"category": "external",
"summary": "RHBZ#1461846",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1461846"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2015-9096",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-9096"
}
],
"release_date": "2017-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: SMTP command injection via CRLF sequences in RCPT TO or MAIL FROM commands in Net::SMTP"
},
{
"cve": "CVE-2017-10784",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2017-09-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1492012"
}
],
"notes": [
{
"category": "description",
"text": "It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections 3. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-10784"
},
{
"category": "external",
"summary": "RHBZ#1492012",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1492012"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-10784"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
}
],
"release_date": "2017-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick"
},
{
"cve": "CVE-2017-14064",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2017-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1487552"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter\u0027s heap memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary heap exposure during a JSON.generate call",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of ruby as shipped with Red Hat Enterprise Linux 5, and 6. These versions do not include the JSON module.\n\nThis issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7, as well as the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-14064"
},
{
"category": "external",
"summary": "RHBZ#1487552",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1487552"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14064"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/",
"url": "https://www.ruby-lang.org/en/news/2017/09/14/json-heap-exposure-cve-2017-14064/"
}
],
"release_date": "2017-03-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: Arbitrary heap exposure during a JSON.generate call"
},
{
"cve": "CVE-2018-8780",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2018-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1561949"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-8780"
},
{
"category": "external",
"summary": "RHBZ#1561949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8780"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/",
"url": "https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/"
}
],
"release_date": "2018-03-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "workaround",
"details": "It is possible to test for presence of the NULL byte manually prior to call a Dir method with an untrusted string.",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Unintentional directory traversal by poisoned NULL byte in Dir"
},
{
"cve": "CVE-2019-16254",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2020-01-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1789556"
}
],
"notes": [
{
"category": "description",
"text": "Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: HTTP response splitting in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-16254"
},
{
"category": "external",
"summary": "RHBZ#1789556",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789556"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-16254",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16254"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-16254"
}
],
"release_date": "2019-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "ruby: HTTP response splitting in WEBrick"
},
{
"cve": "CVE-2020-25613",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2020-09-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1883623"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Potential HTTP request smuggling in WEBrick",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-25613"
},
{
"category": "external",
"summary": "RHBZ#1883623",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1883623"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-25613",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25613"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25613"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/",
"url": "https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/"
}
],
"release_date": "2020-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Potential HTTP request smuggling in WEBrick"
},
{
"cve": "CVE-2021-28965",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"discovery_date": "2021-04-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1947526"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way the Ruby REXML library parsed XML documents. Parsing a specially crafted XML document using REXML and writing parsed data back to a new XML document results in creating a document with a different structure. This issue could affect the integrity of processed data in applications using REXML that parse XML documents, write data back to XML, and re-parse them again.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: XML round-trip vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-28965"
},
{
"category": "external",
"summary": "RHBZ#1947526",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1947526"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-28965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-28965"
}
],
"release_date": "2021-04-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: XML round-trip vulnerability in REXML"
},
{
"cve": "CVE-2021-31810",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1980126"
}
],
"notes": [
{
"category": "description",
"text": "Ruby\u0027s Net::FTP module trusted the IP address included in the FTP server\u0027s response to the PASV command. A malicious FTP server could use this to make Ruby applications using the Net::FTP module to connect to arbitrary hosts and use this to perform port scanning or information extraction from systems not accessible from the FTP server.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat CloudForms 5.11 does not ship Ruby or RubyGem net-ftp and thus not affected by the flaw. RubyGem net-sftp (Ruby implementation of Secure File Transfer Protocol) which product ship is different library component from the affected package.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-31810"
},
{
"category": "external",
"summary": "RHBZ#1980126",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980126"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-31810",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31810"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-31810"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/",
"url": "https://www.ruby-lang.org/en/news/2021/07/07/trusting-pasv-responses-in-net-ftp/"
}
],
"release_date": "2021-07-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: FTP PASV command response can cause Net::FTP to connect to arbitrary host"
},
{
"cve": "CVE-2021-41819",
"discovery_date": "2021-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2026757"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. RubyGems cgi gem could allow a remote attacker to conduct spoofing attacks caused by the mishandling of security prefixes in cookie names in the CGI::Cookie.parse function. By sending a specially-crafted request, an attacker could perform cookie prefix spoofing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Cookie prefix spoofing in CGI::Cookie.parse",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41819"
},
{
"category": "external",
"summary": "RHBZ#2026757",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2026757"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41819",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41819"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41819"
}
],
"release_date": "2021-11-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Cookie prefix spoofing in CGI::Cookie.parse"
},
{
"cve": "CVE-2022-28739",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-04-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2075687"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overrun vulnerability was found in Ruby. The issue occurs in a conversion algorithm from a String to a Float that causes process termination due to a segmentation fault, but under limited circumstances. This flaw may cause an illegal memory read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Buffer overrun in String-to-Float conversion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-28739"
},
{
"category": "external",
"summary": "RHBZ#2075687",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075687"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28739"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/",
"url": "http://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/"
}
],
"release_date": "2022-04-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Buffer overrun in String-to-Float conversion"
},
{
"cve": "CVE-2023-28756",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-04-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2184061"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Time gem and Time library of Ruby. The Time parser mishandles invalid strings with specific characters and causes an increase in execution time for parsing strings to Time objects. This issue may result in a Regular expression denial of service (ReDoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: ReDoS vulnerability in Time",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28756"
},
{
"category": "external",
"summary": "RHBZ#2184061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2184061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28756"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/",
"url": "https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"
}
],
"release_date": "2023-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: ReDoS vulnerability in Time"
},
{
"cve": "CVE-2024-27282",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2024-04-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2276810"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Ruby. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: Arbitrary memory address read vulnerability with Regex search",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The CVE-2024-27282 vulnerability in Ruby is classified as a Moderate severity issue due to its potential to expose arbitrary heap data relative to the start of the text through the Ruby regex compiler. While the vulnerability allows the extraction of pointers and sensitive strings from memory, its exploitation requires attacker-supplied data to be provided to the regex compiler. This means that an attacker would need to craft specific input to exploit the issue, limiting the ease of exploitation compared to vulnerabilities that might be remotely exploitable without user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-27282"
},
{
"category": "external",
"summary": "RHBZ#2276810",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276810"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282"
},
{
"category": "external",
"summary": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/",
"url": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"
}
],
"release_date": "2024-04-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: Arbitrary memory address read vulnerability with Regex search"
},
{
"cve": "CVE-2026-27820",
"cwe": {
"id": "CWE-131",
"name": "Incorrect Calculation of Buffer Size"
},
"discovery_date": "2026-04-16T18:00:53.206650+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2459002"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in zlib, a Ruby interface for the zlib compression/decompression library. The Zlib::GzipReader component contains a buffer overflow vulnerability. This occurs because the zstream_buffer_ungets function does not ensure sufficient memory capacity before moving existing data, which can lead to memory corruption. An attacker could potentially exploit this to cause unexpected behavior or system instability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A buffer overflow vulnerability exists in the Zlib::GzipReader component of the Ruby zlib interface. This flaw, caused by insufficient memory capacity during data manipulation, could lead to memory corruption and system instability. This vulnerability is considered of a Moderate severity this happens because the high complexity to exploit, additionally the attacker may have not full control over the data is being corrupted or exfiltrated.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-27820"
},
{
"category": "external",
"summary": "RHBZ#2459002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2459002"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27820"
},
{
"category": "external",
"summary": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w",
"url": "https://github.com/ruby/zlib/security/advisories/GHSA-g857-hhfv-j68w"
},
{
"category": "external",
"summary": "https://hackerone.com/reports/3467067",
"url": "https://hackerone.com/reports/3467067"
}
],
"release_date": "2026-04-16T17:27:48.944000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-04-09T12:35:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://images.redhat.com/",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:7305"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Hardened Images:ruby3-3-main@aarch64",
"Red Hat Hardened Images:ruby3-3-main@noarch",
"Red Hat Hardened Images:ruby3-3-main@src",
"Red Hat Hardened Images:ruby3-3-main@x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "zlib: zlib: Memory corruption via buffer overflow in Zlib::GzipReader"
}
]
}
RHSA-2013:1028
Vulnerability from csaf_redhat - Published: 2013-07-09 17:35 - Updated: 2026-04-20 21:35Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka "XML Encryption backwards compatibility attack."
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Fuse ESB Enterprise 7.1.0 roll up patch 1, which fixes multiple security\nissues and various bugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Fuse ESB Enterprise, based on Apache ServiceMix, provides an integration\nplatform.\n\nThis release of Fuse ESB Enterprise 7.1.0 roll up patch 1 is an update to\nFuse ESB Enterprise 7.1.0 and includes bug fixes. Refer to the readme file\nincluded with the patch files for information about the bug fixes.\n\nThe following security issues are also fixed with this release:\n\nXML encryption backwards compatibility attacks were found against various\nframeworks, including Apache CXF. An attacker could force a server to use\ninsecure, legacy cryptosystems, even when secure cryptosystems were enabled\non endpoints. By forcing the use of legacy cryptosystems, flaws such as\nCVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be\nrecovered from cryptograms and symmetric keys. (CVE-2012-5575)\n\nNote: Automatic checks to prevent CVE-2012-5575 are only run when\nWS-SecurityPolicy is used to enforce security requirements. It is best\npractice to use WS-SecurityPolicy to enforce security requirements.\n\nA flaw in JRuby\u0027s JSON gem allowed remote attacks by creating different\ntypes of malicious objects. For example, it could initiate a denial of\nservice attack through resource consumption by using a JSON document to\ncreate arbitrary Ruby symbols, which were never garbage collected. It could\nalso be exploited to create internal objects which could allow a SQL\ninjection attack. (CVE-2013-0269)\n\nIt was discovered that JRuby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nMultiple denial of service flaws were found in the way the Apache CXF\nStAX parser implementation processed certain XML files. If a web service\nutilized the StAX parser, a remote attacker could provide a\nspecially-crafted XML file that, when processed, would lead to excessive\nCPU and memory consumption. (CVE-2013-2160)\n\nNote: Fuse ESB Enterprise 7.1.0 ships JRuby as part of the camel-ruby\ncomponent, which allows users to define Camel routes in Ruby. The default\nuse of JRuby in Fuse ESB Enterprise 7.1.0 does not appear to expose either\nCVE-2013-0269 or CVE-2013-1821. If the version of JRuby shipped with Fuse\nESB Enterprise 7.1.0 was used to build a custom application, then these\nflaws could be exposed.\n\nRed Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; Ruby\non Rails upstream for reporting CVE-2013-0269; and Andreas Falkenberg of\nSEC Consult Deutschland GmbH, and Christian Mainka, Juraj Somorovsky and\nJoerg Schwenk of Ruhr-University Bochum for reporting CVE-2013-2160.\nUpstream acknowledges Thomas Hollstegge of Zweitag and Ben Murphy as the\noriginal reporters of CVE-2013-0269.\n\nAll users of Fuse ESB Enterprise 7.1.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Fuse ESB Enterprise 7.1.0 roll up\npatch 1.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1028",
"url": "https://access.redhat.com/errata/RHSA-2013:1028"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=fuse.esb.enterprise\u0026downloadType=securityPatches\u0026version=7.1.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=fuse.esb.enterprise\u0026downloadType=securityPatches\u0026version=7.1.0"
},
{
"category": "external",
"summary": "http://cxf.apache.org/cve-2012-5575.html",
"url": "http://cxf.apache.org/cve-2012-5575.html"
},
{
"category": "external",
"summary": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc",
"url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc"
},
{
"category": "external",
"summary": "880443",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443"
},
{
"category": "external",
"summary": "909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "929197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1028.json"
}
],
"title": "Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update",
"tracking": {
"current_release_date": "2026-04-20T21:35:07+00:00",
"generator": {
"date": "2026-04-20T21:35:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2013:1028",
"initial_release_date": "2013-07-09T17:35:00+00:00",
"revision_history": [
{
"date": "2013-07-09T17:35:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-09T17:36:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-20T21:35:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fuse ESB Enterprise 7.1.0",
"product": {
"name": "Fuse ESB Enterprise 7.1.0",
"product_id": "Fuse ESB Enterprise 7.1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:fuse_esb_enterprise:7.1.0"
}
}
}
],
"category": "product_family",
"name": "Fuse Enterprise Middleware"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Tibor Jager",
"Kenneth G. Paterson",
"Juraj Somorovsky"
],
"organization": "Ruhr-University Bochum"
}
],
"cve": "CVE-2012-5575",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2012-11-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "880443"
}
],
"notes": [
{
"category": "description",
"text": "Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka \"XML Encryption backwards compatibility attack.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-cxf: XML encryption backwards compatibility attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Fuse ESB Enterprise 7.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5575"
},
{
"category": "external",
"summary": "RHBZ#880443",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5575",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5575"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5575",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5575"
},
{
"category": "external",
"summary": "http://cxf.apache.org/cve-2012-5575.html",
"url": "http://cxf.apache.org/cve-2012-5575.html"
},
{
"category": "external",
"summary": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/",
"url": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/"
}
],
"release_date": "2013-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-09T17:35:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Fuse ESB Enterprise 7.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1028"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"products": [
"Fuse ESB Enterprise 7.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "apache-cxf: XML encryption backwards compatibility attacks"
},
{
"acknowledgments": [
{
"names": [
"Ruby on Rails upstream"
]
},
{
"names": [
"Thomas Hollstegge"
],
"organization": "Zweitag",
"summary": "Acknowledged by upstream."
},
{
"names": [
"Ben Murphy"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-0269",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2013-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "909029"
}
],
"notes": [
{
"category": "description",
"text": "The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka \"Unsafe Object Creation Vulnerability.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-json: Denial of Service and SQL Injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite tools ship RubyGem Json 1.4.6 which is earlier than affected 1.5.5 version however, this version of RubyGem is not affected to the flaw. We may update RubyGem in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Fuse ESB Enterprise 7.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0269"
},
{
"category": "external",
"summary": "RHBZ#909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/"
}
],
"release_date": "2013-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-09T17:35:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Fuse ESB Enterprise 7.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1028"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Fuse ESB Enterprise 7.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-json: Denial of Service and SQL Injection"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Fuse ESB Enterprise 7.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-09T17:35:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Fuse ESB Enterprise 7.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1028"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Fuse ESB Enterprise 7.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"acknowledgments": [
{
"names": [
"Andreas Falkenberg"
],
"organization": "SEC Consult Deutschland GmbH"
},
{
"names": [
"Christian Mainka",
"Juraj Somorovsky",
"Joerg Schwenk"
],
"organization": "Ruhr-University Bochum"
}
],
"cve": "CVE-2013-2160",
"discovery_date": "2013-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "929197"
}
],
"notes": [
{
"category": "description",
"text": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-cxf: Multiple denial of service flaws in the StAX parser",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Fuse ESB Enterprise 7.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2160"
},
{
"category": "external",
"summary": "RHBZ#929197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160"
},
{
"category": "external",
"summary": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc",
"url": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc"
}
],
"release_date": "2013-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-09T17:35:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Fuse ESB Enterprise 7.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1028"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Fuse ESB Enterprise 7.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-cxf: Multiple denial of service flaws in the StAX parser"
}
]
}
RHSA-2013_1028
Vulnerability from csaf_redhat - Published: 2013-07-09 17:35 - Updated: 2024-11-22 06:54Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka "XML Encryption backwards compatibility attack."
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Fuse ESB Enterprise 7.1.0 roll up patch 1, which fixes multiple security\nissues and various bugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Fuse ESB Enterprise, based on Apache ServiceMix, provides an integration\nplatform.\n\nThis release of Fuse ESB Enterprise 7.1.0 roll up patch 1 is an update to\nFuse ESB Enterprise 7.1.0 and includes bug fixes. Refer to the readme file\nincluded with the patch files for information about the bug fixes.\n\nThe following security issues are also fixed with this release:\n\nXML encryption backwards compatibility attacks were found against various\nframeworks, including Apache CXF. An attacker could force a server to use\ninsecure, legacy cryptosystems, even when secure cryptosystems were enabled\non endpoints. By forcing the use of legacy cryptosystems, flaws such as\nCVE-2011-1096 and CVE-2011-2487 would be exposed, allowing plain text to be\nrecovered from cryptograms and symmetric keys. (CVE-2012-5575)\n\nNote: Automatic checks to prevent CVE-2012-5575 are only run when\nWS-SecurityPolicy is used to enforce security requirements. It is best\npractice to use WS-SecurityPolicy to enforce security requirements.\n\nA flaw in JRuby\u0027s JSON gem allowed remote attacks by creating different\ntypes of malicious objects. For example, it could initiate a denial of\nservice attack through resource consumption by using a JSON document to\ncreate arbitrary Ruby symbols, which were never garbage collected. It could\nalso be exploited to create internal objects which could allow a SQL\ninjection attack. (CVE-2013-0269)\n\nIt was discovered that JRuby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nMultiple denial of service flaws were found in the way the Apache CXF\nStAX parser implementation processed certain XML files. If a web service\nutilized the StAX parser, a remote attacker could provide a\nspecially-crafted XML file that, when processed, would lead to excessive\nCPU and memory consumption. (CVE-2013-2160)\n\nNote: Fuse ESB Enterprise 7.1.0 ships JRuby as part of the camel-ruby\ncomponent, which allows users to define Camel routes in Ruby. The default\nuse of JRuby in Fuse ESB Enterprise 7.1.0 does not appear to expose either\nCVE-2013-0269 or CVE-2013-1821. If the version of JRuby shipped with Fuse\nESB Enterprise 7.1.0 was used to build a custom application, then these\nflaws could be exposed.\n\nRed Hat would like to thank Tibor Jager, Kenneth G. Paterson and Juraj\nSomorovsky of Ruhr-University Bochum for reporting CVE-2012-5575; Ruby\non Rails upstream for reporting CVE-2013-0269; and Andreas Falkenberg of\nSEC Consult Deutschland GmbH, and Christian Mainka, Juraj Somorovsky and\nJoerg Schwenk of Ruhr-University Bochum for reporting CVE-2013-2160.\nUpstream acknowledges Thomas Hollstegge of Zweitag and Ben Murphy as the\noriginal reporters of CVE-2013-0269.\n\nAll users of Fuse ESB Enterprise 7.1.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Fuse ESB Enterprise 7.1.0 roll up\npatch 1.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1028",
"url": "https://access.redhat.com/errata/RHSA-2013:1028"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=fuse.esb.enterprise\u0026downloadType=securityPatches\u0026version=7.1.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=fuse.esb.enterprise\u0026downloadType=securityPatches\u0026version=7.1.0"
},
{
"category": "external",
"summary": "http://cxf.apache.org/cve-2012-5575.html",
"url": "http://cxf.apache.org/cve-2012-5575.html"
},
{
"category": "external",
"summary": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc",
"url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc"
},
{
"category": "external",
"summary": "880443",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443"
},
{
"category": "external",
"summary": "909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "929197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1028.json"
}
],
"title": "Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update",
"tracking": {
"current_release_date": "2024-11-22T06:54:49+00:00",
"generator": {
"date": "2024-11-22T06:54:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:1028",
"initial_release_date": "2013-07-09T17:35:00+00:00",
"revision_history": [
{
"date": "2013-07-09T17:35:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-07-09T17:36:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T06:54:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fuse ESB Enterprise 7.1.0",
"product": {
"name": "Fuse ESB Enterprise 7.1.0",
"product_id": "Fuse ESB Enterprise 7.1.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:fuse_esb_enterprise:7.1.0"
}
}
}
],
"category": "product_family",
"name": "Fuse Enterprise Middleware"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Tibor Jager",
"Kenneth G. Paterson",
"Juraj Somorovsky"
],
"organization": "Ruhr-University Bochum"
}
],
"cve": "CVE-2012-5575",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2012-11-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "880443"
}
],
"notes": [
{
"category": "description",
"text": "Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and makes it easier to decrypt communications, aka \"XML Encryption backwards compatibility attack.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-cxf: XML encryption backwards compatibility attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Fuse ESB Enterprise 7.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5575"
},
{
"category": "external",
"summary": "RHBZ#880443",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=880443"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5575",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5575"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5575",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5575"
},
{
"category": "external",
"summary": "http://cxf.apache.org/cve-2012-5575.html",
"url": "http://cxf.apache.org/cve-2012-5575.html"
},
{
"category": "external",
"summary": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/",
"url": "http://www.nds.ruhr-uni-bochum.de/research/publications/backwards-compatibility/"
}
],
"release_date": "2013-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-09T17:35:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Fuse ESB Enterprise 7.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1028"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"products": [
"Fuse ESB Enterprise 7.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "apache-cxf: XML encryption backwards compatibility attacks"
},
{
"acknowledgments": [
{
"names": [
"Ruby on Rails upstream"
]
},
{
"names": [
"Thomas Hollstegge"
],
"organization": "Zweitag",
"summary": "Acknowledged by upstream."
},
{
"names": [
"Ben Murphy"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-0269",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2013-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "909029"
}
],
"notes": [
{
"category": "description",
"text": "The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka \"Unsafe Object Creation Vulnerability.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-json: Denial of Service and SQL Injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite tools ship RubyGem Json 1.4.6 which is earlier than affected 1.5.5 version however, this version of RubyGem is not affected to the flaw. We may update RubyGem in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Fuse ESB Enterprise 7.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0269"
},
{
"category": "external",
"summary": "RHBZ#909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/"
}
],
"release_date": "2013-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-09T17:35:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Fuse ESB Enterprise 7.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1028"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Fuse ESB Enterprise 7.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-json: Denial of Service and SQL Injection"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Fuse ESB Enterprise 7.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-09T17:35:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Fuse ESB Enterprise 7.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1028"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Fuse ESB Enterprise 7.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"acknowledgments": [
{
"names": [
"Andreas Falkenberg"
],
"organization": "SEC Consult Deutschland GmbH"
},
{
"names": [
"Christian Mainka",
"Juraj Somorovsky",
"Joerg Schwenk"
],
"organization": "Ruhr-University Bochum"
}
],
"cve": "CVE-2013-2160",
"discovery_date": "2013-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "929197"
}
],
"notes": [
{
"category": "description",
"text": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-cxf: Multiple denial of service flaws in the StAX parser",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Fuse ESB Enterprise 7.1.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2160"
},
{
"category": "external",
"summary": "RHBZ#929197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160"
},
{
"category": "external",
"summary": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc",
"url": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc"
}
],
"release_date": "2013-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-07-09T17:35:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Fuse ESB Enterprise 7.1.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1028"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Fuse ESB Enterprise 7.1.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-cxf: Multiple denial of service flaws in the StAX parser"
}
]
}
RHSA-2013_1185
Vulnerability from csaf_redhat - Published: 2013-08-29 23:22 - Updated: 2024-11-22 07:01The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Fuse 6.0.0 patch 2, which fixes several security issues and\nvarious bugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Fuse 6.0.0, based on Apache ServiceMix, provides an\nintegration platform.\n\nRed Hat JBoss Fuse 6.0.0 patch 2 is an update to Red Hat JBoss Fuse 6.0.0\nand includes bug fixes. Refer to the readme file included with the patch\nfiles for information about these fixes.\n\nThe following security issues are also resolved with this update:\n\nA flaw was found in the logging performed during deserialization of the\nBrokerFactory class in Apache OpenJPA. A remote attacker able to supply a\nserialized instance of the BrokerFactory class, which will be deserialized\non a server, could use this flaw to write an executable file to the\nserver\u0027s file system. (CVE-2013-1768)\n\nA flaw in JRuby\u0027s JSON gem allowed remote attacks by creating different\ntypes of malicious objects. For example, it could initiate a denial of\nservice attack through resource consumption by using a JSON document to\ncreate arbitrary Ruby symbols, which were never garbage collected. It could\nalso be exploited to create internal objects which could allow a SQL\ninjection attack. (CVE-2013-0269)\n\nIt was discovered that JRuby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nNote: Red Hat JBoss Fuse 6.0.0 ships JRuby as part of the camel-ruby\ncomponent, which allows users to define Camel routes in Ruby. The default\nuse of JRuby in Red Hat JBoss Fuse 6.0.0 does not appear to expose either\nCVE-2013-0269 or CVE-2013-1821. If the version of JRuby shipped with Red\nHat JBoss Fuse 6.0.0 was used to build a custom application, then these\nflaws could be exposed.\n\nMultiple denial of service flaws were found in the way the Apache CXF StAX\nparser implementation processed certain XML files. If a web service\nutilized the StAX parser, a remote attacker could provide a\nspecially-crafted XML file that, when processed, would lead to excessive\nCPU and memory consumption. (CVE-2013-2160)\n\nRed Hat would like to thank Ruby on Rails upstream for reporting\nCVE-2013-0269, and Andreas Falkenberg of SEC Consult Deutschland GmbH, and\nChristian Mainka, Juraj Somorovsky and Joerg Schwenk of Ruhr-University\nBochum for reporting CVE-2013-2160. Upstream acknowledges Thomas Hollstegge\nof Zweitag and Ben Murphy as the original reporters of CVE-2013-0269.\n\nAll users of Red Hat JBoss Fuse 6.0 as provided from the Red Hat Customer\nPortal are advised to apply this patch.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1185",
"url": "https://access.redhat.com/errata/RHSA-2013:1185"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc",
"url": "https://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.0.0",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=securityPatches\u0026version=6.0.0"
},
{
"category": "external",
"summary": "909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "929197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197"
},
{
"category": "external",
"summary": "984034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=984034"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1185.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Fuse 6.0.0 patch 2",
"tracking": {
"current_release_date": "2024-11-22T07:01:20+00:00",
"generator": {
"date": "2024-11-22T07:01:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2013:1185",
"initial_release_date": "2013-08-29T23:22:00+00:00",
"revision_history": [
{
"date": "2013-08-29T23:22:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-08-29T23:27:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T07:01:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Fuse 6.0",
"product": {
"name": "Red Hat JBoss Fuse 6.0",
"product_id": "Red Hat JBoss Fuse 6.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_fuse:6.0.0"
}
}
}
],
"category": "product_family",
"name": "Fuse Enterprise Middleware"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ruby on Rails upstream"
]
},
{
"names": [
"Thomas Hollstegge"
],
"organization": "Zweitag",
"summary": "Acknowledged by upstream."
},
{
"names": [
"Ben Murphy"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-0269",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2013-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "909029"
}
],
"notes": [
{
"category": "description",
"text": "The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka \"Unsafe Object Creation Vulnerability.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-json: Denial of Service and SQL Injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite tools ship RubyGem Json 1.4.6 which is earlier than affected 1.5.5 version however, this version of RubyGem is not affected to the flaw. We may update RubyGem in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0269"
},
{
"category": "external",
"summary": "RHBZ#909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/"
}
],
"release_date": "2013-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-29T23:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1185"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Fuse 6.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-json: Denial of Service and SQL Injection"
},
{
"cve": "CVE-2013-1768",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2013-07-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "984034"
}
],
"notes": [
{
"category": "description",
"text": "The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized object and leveraging improperly secured server programs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1768"
},
{
"category": "external",
"summary": "RHBZ#984034",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=984034"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1768",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1768"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1768",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1768"
}
],
"release_date": "2013-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-29T23:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1185"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Fuse 6.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "openjpa: Remote arbitrary code execution by creating a serialized object and leveraging improperly secured server programs"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-29T23:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1185"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Fuse 6.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
},
{
"acknowledgments": [
{
"names": [
"Andreas Falkenberg"
],
"organization": "SEC Consult Deutschland GmbH"
},
{
"names": [
"Christian Mainka",
"Juraj Somorovsky",
"Joerg Schwenk"
],
"organization": "Ruhr-University Bochum"
}
],
"cve": "CVE-2013-2160",
"discovery_date": "2013-03-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "929197"
}
],
"notes": [
{
"category": "description",
"text": "The streaming XML parser in Apache CXF 2.5.x before 2.5.10, 2.6.x before 2.6.7, and 2.7.x before 2.7.4 allows remote attackers to cause a denial of service (CPU and memory consumption) via crafted XML with a large number of (1) elements, (2) attributes, (3) nested constructs, and possibly other vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache-cxf: Multiple denial of service flaws in the StAX parser",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Fuse 6.0"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-2160"
},
{
"category": "external",
"summary": "RHBZ#929197",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=929197"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2160"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2160"
},
{
"category": "external",
"summary": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc",
"url": "http://cxf.apache.org/security-advisories.data/CVE-2013-2160.txt.asc"
}
],
"release_date": "2013-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-29T23:22:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update).",
"product_ids": [
"Red Hat JBoss Fuse 6.0"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1185"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss Fuse 6.0"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache-cxf: Multiple denial of service flaws in the StAX parser"
}
]
}
RHSA-2013:1147
Vulnerability from csaf_redhat - Published: 2013-08-08 17:04 - Updated: 2026-04-20 21:35It was found that Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss SOA Platform 5.3.1 roll up patch 3, which fixes three\nsecurity issues and various bugs, is now available from the Red Hat\nCustomer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss SOA Platform is the next-generation ESB and business process\nautomation infrastructure. Red Hat JBoss SOA Platform allows IT to leverage\nexisting (MoM and EAI), modern (SOA and BPM-Rules), and future (EDA and\nCEP) integration methodologies to dramatically improve business process\nexecution speed and quality.\n\nThis roll up patch serves as a cumulative upgrade for Red Hat JBoss SOA\nPlatform 5.3.1. It includes various bug fixes. The following security\nissues are also fixed with this release:\n\nThe Jakarta Commons HttpClient component did not verify that the server\nhostname matched the domain name in the subject\u0027s Common Name (CN) or\nsubjectAltName field in X.509 certificates. This could allow a\nman-in-the-middle attacker to spoof an SSL server if they had a certificate\nthat was valid for any domain name. (CVE-2012-5783)\n\nA flaw in JRuby\u0027s JSON gem allowed remote attacks by creating different\ntypes of malicious objects. For example, it could initiate a denial of\nservice attack through resource consumption by using a JSON document to\ncreate arbitrary Ruby symbols, which were never garbage collected. It could\nalso be exploited to create internal objects which could allow a SQL\ninjection attack. (CVE-2013-0269)\n\nIt was discovered that JRuby\u0027s REXML library did not properly restrict XML\nentity expansion. An attacker could use this flaw to cause a denial of\nservice by tricking a Ruby application using REXML to read text nodes from\nspecially-crafted XML content, which will result in REXML consuming large\namounts of system memory. (CVE-2013-1821)\n\nNote: Red Hat JBoss SOA Platform only provides JRuby as a dependency of\nthe scripting_chain quickstart example application. The CVE-2013-0269 and\nCVE-2013-1821 flaws are not exposed unless the version of JRuby shipped\nwith that quickstart is used by a deployed, custom application.\n\nRed Hat would like to thank Ruby on Rails upstream for reporting\nCVE-2013-0269. Upstream acknowledges Thomas Hollstegge of Zweitag and Ben\nMurphy as the original reporters of CVE-2013-0269.\n\nWarning: Before applying the update, back up your existing Red Hat JBoss\nSOA Platform installation (including its databases, applications,\nconfiguration files, and so on).\n\nAll users of Red Hat JBoss SOA Platform 5.3.1 as provided from the Red\nHat Customer Portal are advised to apply this roll up patch.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2013:1147",
"url": "https://access.redhat.com/errata/RHSA-2013:1147"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=5.3.1+GA",
"url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=5.3.1+GA"
},
{
"category": "external",
"summary": "873317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=873317"
},
{
"category": "external",
"summary": "909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_1147.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update",
"tracking": {
"current_release_date": "2026-04-20T21:35:08+00:00",
"generator": {
"date": "2026-04-20T21:35:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2013:1147",
"initial_release_date": "2013-08-08T17:04:00+00:00",
"revision_history": [
{
"date": "2013-08-08T17:04:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2013-08-08T17:07:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-20T21:35:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss SOA Platform 5.3",
"product": {
"name": "Red Hat JBoss SOA Platform 5.3",
"product_id": "Red Hat JBoss SOA Platform 5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Middleware"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-5783",
"discovery_date": "2012-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "873317"
}
],
"notes": [
{
"category": "description",
"text": "It was found that Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2012-5783"
},
{
"category": "external",
"summary": "RHBZ#873317",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=873317"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5783",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5783"
}
],
"release_date": "2012-10-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-08T17:04:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the Red Hat\nJBoss SOA Platform server by starting the JBoss Application Server\nprocess.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1147"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name"
},
{
"acknowledgments": [
{
"names": [
"Ruby on Rails upstream"
]
},
{
"names": [
"Thomas Hollstegge"
],
"organization": "Zweitag",
"summary": "Acknowledged by upstream."
},
{
"names": [
"Ben Murphy"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2013-0269",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"discovery_date": "2013-02-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "909029"
}
],
"notes": [
{
"category": "description",
"text": "The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka \"Unsafe Object Creation Vulnerability.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rubygem-json: Denial of Service and SQL Injection",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite tools ship RubyGem Json 1.4.6 which is earlier than affected 1.5.5 version however, this version of RubyGem is not affected to the flaw. We may update RubyGem in a future release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-0269"
},
{
"category": "external",
"summary": "RHBZ#909029",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=909029"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-0269",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0269"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0269"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/json-dos-cve-2013-0269/"
}
],
"release_date": "2013-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-08T17:04:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the Red Hat\nJBoss SOA Platform server by starting the JBoss Application Server\nprocess.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1147"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rubygem-json: Denial of Service and SQL Injection"
},
{
"cve": "CVE-2013-1821",
"discovery_date": "2013-02-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "914716"
}
],
"notes": [
{
"category": "description",
"text": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ruby: entity expansion DoS vulnerability in REXML",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss SOA Platform 5.3"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2013-1821"
},
{
"category": "external",
"summary": "RHBZ#914716",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2013-1821",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1821"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"category": "external",
"summary": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
}
],
"release_date": "2013-02-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2013-08-08T17:04:00+00:00",
"details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its\ndatabases, applications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform\nserver by stopping the JBoss Application Server process before installing\nthis update, and then after installing the update, restart the Red Hat\nJBoss SOA Platform server by starting the JBoss Application Server\nprocess.",
"product_ids": [
"Red Hat JBoss SOA Platform 5.3"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2013:1147"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"Red Hat JBoss SOA Platform 5.3"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ruby: entity expansion DoS vulnerability in REXML"
}
]
}
WID-SEC-W-2023-1601
Vulnerability from csaf_certbund - Published: 2013-08-08 22:00 - Updated: 2023-06-29 22:00Es besteht eine Schwachstelle bezüglich der Überprüfung von SSL Zertifikaten in der Jakarta Commons HttpClient Komponente. Diese Schwachstelle wird dadurch verursacht, dass betroffene Software den Hostnamen des Servers nicht mit dem Domainnamen aus dem Common Name (CN) oder "SubjectAltName" Feld des X.509 Zertifikates abgleicht. Ein entfernter, anonymer Angreifer kann diese Schwachstelle mittels eines man-in-the-middle Angriffs ausnutzen, um Sicherheitsfunktionen zu umgehen und um einen Benutzer zu täuschen, dass er sich auf einer vertrauten Internetseite befindet. Für die Ausnutzung dieser Schwachstellen ist eine Benutzeraktion erforderlich.
Es existiert eine Schwachstelle in "JSON gem" welches mit Red Hat JBoss SOA Platform. Diese Schwachstelle tritt während der Verarbeitung speziell manipulierter JSON Dokumente auf. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen SQL-Code zu injizieren, um einen Denial of Service herbeizuführen oder um Sicherheitsfunktionen zu umgehen.
In Ruby besteht eine Denial of Service Schwachstelle. Diese Schwachstelle befindet sich im REXML Parser und tritt während der Verarbeitung speziell manipulierter XML Dokumente auf. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Angriff durchzuführen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Anwender dazu bringen eine manipulierte XML Datei zu öffnen.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JBoss Enterprise SOA Platform ist eine Infrastruktur zur Automatisierung von ESB und Businessprozessen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat JBoss Enterprise SOA Platform ausnutzen, um Sicherheitsvorkehrungen zu umgehen, um Informationen zu manipulieren oder um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1601 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2013/wid-sec-w-2023-1601.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1601 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1601"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3954 vom 2023-06-29",
"url": "https://access.redhat.com/errata/RHSA-2023:3954"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2013:1147-1 vom 2013-08-08",
"url": "https://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-2738-1 vom 2013-08-19",
"url": "http://www.debian.org/security/2013/dsa-2738"
},
{
"category": "external",
"summary": "RedHat Security Advisory RHSA-2013-1185 vom 2013-08-29",
"url": "https://rhn.redhat.com/errata/RHSA-2013-1185.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2014:1834-1 vom 2014-11-10",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1834.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2014:1833-1 vom 2014-11-10",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1833.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2014:2019-1 vom 2014-12-18",
"url": "http://rhn.redhat.com/errata/RHSA-2014-2019.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2017:0868 vom 2017-04-04",
"url": "https://access.redhat.com/errata/RHSA-2017:0868"
}
],
"source_lang": "en-US",
"title": "Red Hat JBoss Enterprise SOA Platform: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-06-29T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:53:55.866+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1601",
"initial_release_date": "2013-08-08T22:00:00.000+00:00",
"revision_history": [
{
"date": "2013-08-08T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2013-08-08T22:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2013-08-19T22:00:00.000+00:00",
"number": "3",
"summary": "New remediations available"
},
{
"date": "2013-08-29T22:00:00.000+00:00",
"number": "4",
"summary": "New remediations available"
},
{
"date": "2014-11-10T23:00:00.000+00:00",
"number": "5",
"summary": "New remediations available"
},
{
"date": "2014-12-18T23:00:00.000+00:00",
"number": "6",
"summary": "New remediations available"
},
{
"date": "2014-12-18T23:00:00.000+00:00",
"number": "7",
"summary": "Version nicht vorhanden"
},
{
"date": "2017-04-03T22:00:00.000+00:00",
"number": "8",
"summary": "New remediations available"
},
{
"date": "2023-06-29T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 6 EL5",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 6 EL5",
"product_id": "T001224",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6:el5"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 6 EL6",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 6 EL6",
"product_id": "T001225",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6:el6"
}
}
}
],
"category": "product_name",
"name": "JBoss Enterprise Application Platform"
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise SOA Platform 5.3.1",
"product": {
"name": "Red Hat JBoss Enterprise SOA Platform 5.3.1",
"product_id": "198379",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3.1"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-5783",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle bez\u00fcglich der \u00dcberpr\u00fcfung von SSL Zertifikaten in der Jakarta Commons HttpClient Komponente. Diese Schwachstelle wird dadurch verursacht, dass betroffene Software den Hostnamen des Servers nicht mit dem Domainnamen aus dem Common Name (CN) oder \"SubjectAltName\" Feld des X.509 Zertifikates abgleicht. Ein entfernter, anonymer Angreifer kann diese Schwachstelle mittels eines man-in-the-middle Angriffs ausnutzen, um Sicherheitsfunktionen zu umgehen und um einen Benutzer zu t\u00e4uschen, dass er sich auf einer vertrauten Internetseite befindet. F\u00fcr die Ausnutzung dieser Schwachstellen ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"67646",
"T001225",
"T001224",
"198379"
]
},
"release_date": "2013-08-08T22:00:00.000+00:00",
"title": "CVE-2012-5783"
},
{
"cve": "CVE-2013-0269",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in \"JSON gem\" welches mit Red Hat JBoss SOA Platform. Diese Schwachstelle tritt w\u00e4hrend der Verarbeitung speziell manipulierter JSON Dokumente auf. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen SQL-Code zu injizieren, um einen Denial of Service herbeizuf\u00fchren oder um Sicherheitsfunktionen zu umgehen."
}
],
"product_status": {
"known_affected": [
"198379"
]
},
"release_date": "2013-08-08T22:00:00.000+00:00",
"title": "CVE-2013-0269"
},
{
"cve": "CVE-2013-1821",
"notes": [
{
"category": "description",
"text": "In Ruby besteht eine Denial of Service Schwachstelle. Diese Schwachstelle befindet sich im REXML Parser und tritt w\u00e4hrend der Verarbeitung speziell manipulierter XML Dokumente auf. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Anwender dazu bringen eine manipulierte XML Datei zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"198379"
]
},
"release_date": "2013-08-08T22:00:00.000+00:00",
"title": "CVE-2013-1821"
}
]
}
GSD-2013-1821
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-1821",
"description": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"id": "GSD-2013-1821",
"references": [
"https://www.suse.com/security/cve/CVE-2013-1821.html",
"https://www.debian.org/security/2013/dsa-2809",
"https://www.debian.org/security/2013/dsa-2738",
"https://access.redhat.com/errata/RHSA-2013:1185",
"https://access.redhat.com/errata/RHSA-2013:1147",
"https://access.redhat.com/errata/RHSA-2013:1028",
"https://access.redhat.com/errata/RHSA-2013:0612",
"https://access.redhat.com/errata/RHSA-2013:0611",
"https://alas.aws.amazon.com/cve/html/CVE-2013-1821.html",
"https://linux.oracle.com/cve/CVE-2013-1821.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-1821"
],
"details": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"id": "GSD-2013-1821",
"modified": "2023-12-13T01:22:20.131461Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1821",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2013:0612",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0612.html"
},
{
"name": "MDVSA-2013:124",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:124"
},
{
"name": "openSUSE-SU-2013:0603",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"
},
{
"name": "SSA:2013-075-01",
"refsource": "SLACKWARE",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862"
},
{
"name": "52783",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52783"
},
{
"name": "DSA-2738",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2738"
},
{
"name": "openSUSE-SU-2013:0614",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html"
},
{
"name": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384",
"refsource": "CONFIRM",
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092",
"refsource": "CONFIRM",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
},
{
"name": "USN-1780-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1780-1"
},
{
"name": "58141",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/58141"
},
{
"name": "52902",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/52902"
},
{
"name": "[oss-security] 20130306 CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/06/5"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=914716",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"name": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"refsource": "CONFIRM",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
},
{
"name": "SUSE-SU-2013:0609",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
},
{
"name": "DSA-2809",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2809"
},
{
"name": "RHSA-2013:1028",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
},
{
"name": "RHSA-2013:0611",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0611.html"
},
{
"name": "RHSA-2013:1147",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"name": "SUSE-SU-2013:0647",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,1.7.2]",
"affected_versions": "All versions up to 1.7.2",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2016-12-07",
"description": "`lib/rexml/text.rb` in the REXML parser allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.",
"fixed_versions": [
"1.7.3"
],
"identifier": "CVE-2013-1821",
"identifiers": [
"CVE-2013-1821"
],
"not_impacted": "All versions after 1.7.2",
"package_slug": "maven/org.jruby/jruby",
"pubdate": "2013-04-09",
"solution": "Upgrade to version 1.7.3 or above.",
"title": "Entity expansion DoS vulnerability in REXML",
"urls": [
"https://github.com/victims/victims-cve-db/blob/master/database/java/2013/1821.yaml"
],
"uuid": "0cc915dc-fba3-429b-91de-b633ee5873dd"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:*:p385:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.9.3",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1821"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=914716",
"refsource": "MISC",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"name": "52902",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/52902"
},
{
"name": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
},
{
"name": "USN-1780-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-1780-1"
},
{
"name": "[oss-security] 20130306 CVE for Ruby Entity expansion DoS vulnerability in REXML (XML bomb)",
"refsource": "MLIST",
"tags": [],
"url": "http://www.openwall.com/lists/oss-security/2013/03/06/5"
},
{
"name": "openSUSE-SU-2013:0603",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"
},
{
"name": "openSUSE-SU-2013:0614",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html"
},
{
"name": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384",
"refsource": "CONFIRM",
"tags": [],
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384"
},
{
"name": "RHSA-2013:0611",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0611.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525",
"refsource": "MISC",
"tags": [],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525"
},
{
"name": "52783",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/52783"
},
{
"name": "RHSA-2013:0612",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-0612.html"
},
{
"name": "SUSE-SU-2013:0609",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
},
{
"name": "SUSE-SU-2013:0647",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
},
{
"name": "RHSA-2013:1028",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
},
{
"name": "RHSA-2013:1147",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"name": "DSA-2809",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2013/dsa-2809"
},
{
"name": "DSA-2738",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2013/dsa-2738"
},
{
"name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092",
"refsource": "CONFIRM",
"tags": [],
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092"
},
{
"name": "MDVSA-2013:124",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:124"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
},
{
"name": "58141",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/58141"
},
{
"name": "SSA:2013-075-01",
"refsource": "SLACKWARE",
"tags": [],
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2016-12-08T03:03Z",
"publishedDate": "2013-04-09T21:55Z"
}
}
}
FKIE_CVE-2013-1821
Vulnerability from fkie_nvd - Published: 2013-04-09 21:55 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525 | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html | ||
| secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0611.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-0612.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-1028.html | ||
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2013-1147.html | ||
| secalert@redhat.com | http://secunia.com/advisories/52783 | Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/52902 | Vendor Advisory | |
| secalert@redhat.com | http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384 | ||
| secalert@redhat.com | http://www.debian.org/security/2013/dsa-2738 | ||
| secalert@redhat.com | http://www.debian.org/security/2013/dsa-2809 | ||
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2013:124 | ||
| secalert@redhat.com | http://www.openwall.com/lists/oss-security/2013/03/06/5 | ||
| secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html | ||
| secalert@redhat.com | http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/ | Vendor Advisory | |
| secalert@redhat.com | http://www.securityfocus.com/bid/58141 | ||
| secalert@redhat.com | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862 | ||
| secalert@redhat.com | http://www.ubuntu.com/usn/USN-1780-1 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=914716 | ||
| secalert@redhat.com | https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0611.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0612.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1028.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-1147.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/52783 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/52902 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=39384 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2738 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2013/dsa-2809 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2013:124 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2013/03/06/5 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/58141 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-1780-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=914716 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092 |
| Vendor | Product | Version | |
|---|---|---|---|
| ruby-lang | ruby | * | |
| ruby-lang | ruby | 1.9 | |
| ruby-lang | ruby | 1.9.1 | |
| ruby-lang | ruby | 1.9.2 | |
| ruby-lang | ruby | 1.9.3 | |
| ruby-lang | ruby | 1.9.3 | |
| ruby-lang | ruby | 1.9.3 | |
| ruby-lang | ruby | 1.9.3 | |
| ruby-lang | ruby | 1.9.3 | |
| ruby-lang | ruby | 1.9.3 | |
| ruby-lang | ruby | 2.0 | |
| ruby-lang | ruby | 2.0.0 | |
| ruby-lang | ruby | 2.0.0 | |
| ruby-lang | ruby | 2.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:p385:*:*:*:*:*:*",
"matchCriteriaId": "AA8C0F8E-4C21-4181-84A5-D17E70D19D9A",
"versionEndIncluding": "1.9.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D9237145-35F8-4E05-B730-77C0F386E5B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C78BB1D8-0505-484D-B824-1AA219F8B247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5178D04D-1C29-4353-8987-559AA07443EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D0535DC9-EB0E-4745-80AC-4A020DF26E38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*",
"matchCriteriaId": "94F5AA37-B466-4E2E-B217-5119BADDD87B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*",
"matchCriteriaId": "6DF0F0F5-4022-4837-9B40-4B1127732CC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*",
"matchCriteriaId": "B3848B08-85C2-4AAD-AA33-CCEB80EF5B32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*",
"matchCriteriaId": "B7927D40-2A3A-43AD-99F6-CE61882A1FF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*",
"matchCriteriaId": "AA406EC6-6CA5-40A6-A879-AA8940CBEF07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "90E0471D-1323-4E67-B66C-DEBF3BBAEEAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B03B7561-A854-4EFA-9E4E-CFC4EEAE4EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "285A3431-BDFE-40C5-92CD-B18217757C23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D66B32CB-AC49-4A1C-85ED-6389F27CB319",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack."
},
{
"lang": "es",
"value": "lib/rexml/text.rb en el analizador REXML en Ruby anterior a 1.9.3-p392, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria o ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de nodos de texto manipulados en un documento XML. Aka como ataque XML Entity Expansion (XEE)."
}
],
"evaluatorImpact": "Per: http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/\r\n\r\n\"Affected versions\r\n\r\n All ruby 1.9 versions prior to ruby 1.9.3 patchlevel 392\r\n All ruby 2.0 versions prior to ruby 2.0.0 patchlevel 0\r\n prior to trunk revision 39384\"\r\n",
"id": "CVE-2013-1821",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-04-09T21:55:01.113",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"
},
{
"source": "secalert@redhat.com",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0611.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0612.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/52783"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/52902"
},
{
"source": "secalert@redhat.com",
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2013/dsa-2738"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2013/dsa-2809"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:124"
},
{
"source": "secalert@redhat.com",
"url": "http://www.openwall.com/lists/oss-security/2013/03/06/5"
},
{
"source": "secalert@redhat.com",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/58141"
},
{
"source": "secalert@redhat.com",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/USN-1780-1"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"source": "secalert@redhat.com",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0611.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-0612.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1028.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/52783"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/52902"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2013/dsa-2738"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2013/dsa-2809"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2013/03/06/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/58141"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1780-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-HGG7-CGHQ-XHF4
Vulnerability from github – Published: 2022-05-17 03:23 – Updated: 2023-08-16 09:36When reading text nodes from an XML document, the REXML parser can be coerced in to allocating extremely large string objects which can consume all of the memory on a machine, causing a denial of service.
Jruby resolves this bug in version 1.7.3 as noted in https://www.jruby.org/2013/02/21/jruby-1-7-3.html
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.jruby:jruby"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.7.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2013-1821"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": true,
"github_reviewed_at": "2022-11-08T12:51:05Z",
"nvd_published_at": "2013-04-09T21:55:00Z",
"severity": "MODERATE"
},
"details": "When reading text nodes from an XML document, the REXML parser can be coerced in to allocating extremely large string objects which can consume all of the memory on a machine, causing a denial of service.\n\nJruby resolves this bug in version 1.7.3 as noted in https://www.jruby.org/2013/02/21/jruby-1-7-3.html",
"id": "GHSA-hgg7-cghq-xhf4",
"modified": "2023-08-16T09:36:12Z",
"published": "2022-05-17T03:23:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1821"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=914716"
},
{
"type": "PACKAGE",
"url": "https://github.com/jruby/jruby"
},
{
"type": "WEB",
"url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0092"
},
{
"type": "WEB",
"url": "https://www.jruby.org/2013/02/21/jruby-1-7-3.html"
},
{
"type": "WEB",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00036.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1147.html"
},
{
"type": "WEB",
"url": "http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision\u0026revision=39384"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2013/dsa-2738"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2013/dsa-2809"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:124"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2013/03/06/5"
},
{
"type": "WEB",
"url": "http://www.ruby-lang.org/en/news/2013/02/22/rexml-dos-2013-02-22"
},
{
"type": "WEB",
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2013\u0026m=slackware-security.426862"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1780-1"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Ruby vulnerable to denial of service"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.