RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."
https://www.trustwave.com/Resources/SpiderLabs-Blog/Attacking-Ruby-Gem-Security-with-CVE-2015-3900/
https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-007/?fid=6356
https://puppet.com/security/cve/CVE-2015-3900
http://www.securityfocus.com/bid/75482
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.openwall.com/lists/oss-security/2015/06/26/2
http://rhn.redhat.com/errata/RHSA-2015-1657.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164236.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163600.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163502.html