A vulnerability was found in Bundler. Bundler allows the user to specify sources from which Ruby gems are installed. If a secondary source is specified, even if scoped to a specific gem, that source is silently applied to all declared gems. This allows an attacker to introduce arbitrary code into an application via gem name collision on the secondary source, which will unexpectedly (and without warning) take priority over the primary source. CVE request: http://seclists.org/oss-sec/2016/q4/18 CVE assignment: http://seclists.org/oss-sec/2016/q4/20 References: http://seclists.org/oss-sec/2016/q4/25
Created rubygem-bundler tracking bugs for this issue: Affects: fedora-all [bug 1381952] Affects: epel-6 [bug 1381953]
External References: https://collectiveidea.com/blog/archives/2016/10/06/bundlers-multiple-source-security-vulnerability https://github.com/bundler/bundler/issues/5051 https://github.com/bundler/bundler/issues/5274
Statement: Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.