RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.
https://github.com/rubygems/rubygems/blob/1.8/History.txt
https://bugzilla.redhat.com/show_bug.cgi?id=814718
http://www.ubuntu.com/usn/USN-1582-1/
http://www.openwall.com/lists/oss-security/2012/04/20/24
http://secunia.com/advisories/55381
http://rhn.redhat.com/errata/RHSA-2013-1852.html