SB20260415181 - SUSE update for rubygem-bundler
Published: April 15, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Insufficient verification of data authenticity (CVE-ID: CVE-2020-36327)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to insufficient verification of data authenticity in Bundler, when choosing a dependency source. The application selects a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application.
2) Improper Neutralization of Argument Delimiters in a Command (CVE-ID: CVE-2021-43809)
The vulnerability allows a local user to execute arbitrary code on the target system.
The vulnerability occurs when working with untrusted and apparently harmless `Gemfile`'s. A local user can trick the victim into opening a specially crafted directory containing a `Gemfile` file that declares a dependency that is located in a Git repository and execute arbitrary code on the target system.
Remediation
Install update from vendor's website.