An update for rubygem-bundler is now available for openEuler-20.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1258
Final
1.0
1.0
2021-07-03
Initial
2021-07-03
2021-07-03
openEuler SA Tool V1.0
2021-07-03
rubygem-bundler security update
An update for rubygem-bundler is now available for openEuler-20.03-LTS-SP1.
Bundler manages an application's dependencies through its entire life, across many machines, systematically and repeatably.
Security Fix(es):
Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every Dependency Confusion issue in every product.(CVE-2020-36327)
An update for rubygem-bundler is now available for openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
rubygem-bundler
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1258
https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-36327
https://nvd.nist.gov/vuln/detail/CVE-2020-36327
openEuler-20.03-LTS-SP1
rubygem-bundler-2.2.19-1.oe1.noarch.rpm
rubygem-bundler-help-2.2.19-1.oe1.noarch.rpm
rubygem-bundler-2.2.19-1.oe1.src.rpm
A vulnerability was discovered in the rubygem-bundler library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.
2021-07-03
CVE-2020-36327
openEuler-20.03-LTS-SP1
High
8.8
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
rubygem-bundler security update
2021-07-03
https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1258