Bug 1381951 (CVE-2016-7954)

Summary: CVE-2016-7954 rubygem-bundler: Code execution via gem name collision in bundler
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: abhgupta, aortega, apevec, ayoung, besser82, bkearney, cbillett, ccoleman, chrisw, cvsbot-xmlrpc, dedgar, dmcphers, hhorak, jgoulding, jialiu, jjoyce, jmatthew, joelsmith, jokerman, jorton, jschluet, katello-bugs, kbasil, kseifried, lhh, lmeyer, lpeer, markmc, mmccomas, mmccune, mmorsi, ohadlevy, rbryant, ruby-maint, satellite6-bugs, sclewis, shreyankg, srevivo, s, strzibny, tdecacqu, tiwillia, tjay, tlestach, tomckay, tsanders, vondruch
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-08-25 14:29:58 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1381952, 1381953    
Bug Blocks: 1381954    

Description Andrej Nemec 2016-10-05 12:19:13 UTC
A vulnerability was found in Bundler. Bundler allows the user to specify sources from which Ruby gems are installed. If a secondary source is specified, even if scoped to a specific gem, that source is silently applied to all declared gems. This allows an attacker to introduce arbitrary code into an application via gem name collision on the secondary source, which will unexpectedly (and without warning) take priority over the primary source.

CVE request:


CVE assignment:




Comment 1 Andrej Nemec 2016-10-05 12:20:15 UTC
Created rubygem-bundler tracking bugs for this issue:

Affects: fedora-all [bug 1381952]
Affects: epel-6 [bug 1381953]

Comment 3 Stefan Cornelius 2017-08-25 14:30:20 UTC

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.