Bug 1759233

Summary: CVE-2019-16892 requires rubyzip >= 1.3
Product: Red Hat CloudForms Management Engine Reporter: drew uhlmann <duhlmann>
Component: SecurityAssignee: Jason Frey <jfrey>
Status: CLOSED CURRENTRELEASE QA Contact: Sudhir Mallamprabhakara <smallamp>
Severity: unspecified Docs Contact: Red Hat CloudForms Documentation <cloudforms-docs>
Priority: unspecified    
Version: 5.10.11CC: bmidwood, dmetzger, grocha, jfrey, jrafanie, obarenbo, simaishi
Target Milestone: GAKeywords: TestOnly, ZStream
Target Release: 5.12.0   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
: 1759252 1767898 (view as bug list) Environment:
Last Closed: 2020-10-26 15:53:03 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: CFME Core Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1759252, 1767898    

Description drew uhlmann 2019-10-07 16:39:42 UTC
Description of problem:
Rubyzip 1.3.0 contains a flag we need for protection against zipbombs.
see CVE-2019-16892 -- https://hakiri.io/github/ManageIQ/manageiq-automation_engine/master/01ca1fe4d416d4f374e3bd7912af6281d7e72fd6/warnings?name=Denial+of+Service

We need https://github.com/rubyzip/rubyzip/pull/403


Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info: