Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 624976 (CVE-2016-7954) - dev-ruby/bundler - allow remote attackers to inject arbitrary Ruby code (CVE-2016-7954)
Summary: dev-ruby/bundler - allow remote attackers to inject arbitrary Ruby code (CVE-...
Status: RESOLVED WONTFIX
Alias: CVE-2016-7954
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://nvd.nist.gov/vuln/detail/CVE-...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2017-07-14 11:52 UTC by Andrey Ovcharov
Modified: 2018-02-21 23:04 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andrey Ovcharov 2017-07-14 11:52:00 UTC
https://nvd.nist.gov/vuln/detail/CVE-2016-7954

"Bundler 1.x might allow remote attackers to inject arbitrary Ruby code into an application by leveraging a gem name collision on a secondary source. NOTE: this might overlap CVE-2013-0334."
Comment 1 Hans de Graaff gentoo-dev Security 2017-07-15 09:13:55 UTC
Upstream bug: https://github.com/bundler/bundler/issues/5051 

Looking at this bug it becomes clear that this is not something that can be fixed in bundler without breaking backward compatibility. A structural fix is planned for bundler 2.x (not released yet) but even then I assume we'll need to keep bundler 1.x around.

Upstream also claims that this is not a very likely attack vector in the first place, since some of the requirements to make use of it open up much easier attacks first. In addition, it requires a non-standard source specification in the Gemfile, something that most packages don't do.

I propose that we close this bug without further action.