{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"rubygem-bundler security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for rubygem-bundler is now available for openEuler-20.03-LTS-SP1.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Bundler manages an application's dependencies through its entire life, across many machines, systematically and repeatably.\n\nSecurity Fix(es):\n\nBundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every Dependency Confusion issue in every product.(CVE-2020-36327)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for rubygem-bundler is now available for openEuler-20.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"rubygem-bundler",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2021-1258",
				"category":"self",
				"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1258"
			},
			{
				"summary":"CVE-2020-36327",
				"category":"self",
				"url":"https://openeuler.org/en/security/cve/detail?cveId=CVE-2020-36327&packageName=rubygem-bundler"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36327"
			},
			{
				"summary":"openEuler-SA-2021-1258 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2021/csaf-openeuler-sa-2021-1258.json"
			}
		],
		"title":"An update for rubygem-bundler is now available for openEuler-20.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2021-07-03T09:21:02+08:00",
			"revision_history":[
				{
					"date":"2021-07-03T09:21:02+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:21:02+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:21:02+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:21:02+08:00",
			"id":"openEuler-SA-2021-1258",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"openEuler-20.03-LTS-SP1",
									"name":"openEuler-20.03-LTS-SP1"
								},
								"name":"openEuler-20.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-bundler-2.2.19-1.oe1.noarch.rpm(20.03-LTS-SP1)",
									"name":"rubygem-bundler-2.2.19-1.oe1.noarch.rpm"
								},
								"name":"rubygem-bundler-2.2.19-1.oe1.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-bundler-help-2.2.19-1.oe1.noarch.rpm(20.03-LTS-SP1)",
									"name":"rubygem-bundler-help-2.2.19-1.oe1.noarch.rpm"
								},
								"name":"rubygem-bundler-help-2.2.19-1.oe1.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-bundler-2.2.19-1.oe1.src.rpm(20.03-LTS-SP1)",
									"name":"rubygem-bundler-2.2.19-1.oe1.src.rpm"
								},
								"name":"rubygem-bundler-2.2.19-1.oe1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-bundler-2.2.19-1.oe1.noarch.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.noarch",
					"name":"rubygem-bundler-2.2.19-1.oe1.noarch as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-bundler-help-2.2.19-1.oe1.noarch.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-bundler-help-2.2.19-1.oe1.noarch",
					"name":"rubygem-bundler-help-2.2.19-1.oe1.noarch as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-bundler-2.2.19-1.oe1.src.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.src",
					"name":"rubygem-bundler-2.2.19-1.oe1.src as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2020-36327",
			"notes":[
				{
					"text":"A vulnerability was discovered in the rubygem-bundler library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.noarch",
					"openEuler-20.03-LTS-SP1:rubygem-bundler-help-2.2.19-1.oe1.noarch",
					"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.noarch",
						"openEuler-20.03-LTS-SP1:rubygem-bundler-help-2.2.19-1.oe1.noarch",
						"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.src"
					],
					"details":"rubygem-bundler security update",
					"category":"vendor_fix",
					"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1258"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.noarch",
						"openEuler-20.03-LTS-SP1:rubygem-bundler-help-2.2.19-1.oe1.noarch",
						"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2020-36327"
		}
	]
}