An update for rubygem-bundler is now available for openEuler-20.03-LTS-SP1 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1258 Final 1.0 1.0 2021-07-03 Initial 2021-07-03 2021-07-03 openEuler SA Tool V1.0 2021-07-03 rubygem-bundler security update An update for rubygem-bundler is now available for openEuler-20.03-LTS-SP1. Bundler manages an application's dependencies through its entire life, across many machines, systematically and repeatably. Security Fix(es): Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every Dependency Confusion issue in every product.(CVE-2020-36327) An update for rubygem-bundler is now available for openEuler-20.03-LTS-SP1. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High rubygem-bundler https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1258 https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-36327 https://nvd.nist.gov/vuln/detail/CVE-2020-36327 openEuler-20.03-LTS-SP1 rubygem-bundler-2.2.19-1.oe1.noarch.rpm rubygem-bundler-help-2.2.19-1.oe1.noarch.rpm rubygem-bundler-2.2.19-1.oe1.src.rpm A vulnerability was discovered in the rubygem-bundler library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. 2021-07-03 CVE-2020-36327 openEuler-20.03-LTS-SP1 High 8.8 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H rubygem-bundler security update 2021-07-03 https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1258