SB2021070316 - openEuler 20.03 LTS SP1 update for rubygem-bundler
Published: July 3, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Insufficient verification of data authenticity (CVE-ID: CVE-2020-36327)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient verification of data authenticity in Bundler, when choosing a dependency source. The application selects a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application.
2) Input validation error (CVE-ID: CVE-2021-24105)
The vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient validation of user-supplied input in Package Managers Configurations. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.