SUSE-SU-2026:1355-1
Vulnerability from csaf_suse - Published: 2026-04-15 13:37 - Updated: 2026-04-15 13:37Summary
Security update for rubygem-bundler
Severity
Important
Notes
Title of the patch: Security update for rubygem-bundler
Description of the patch:
This update for rubygem-bundler fixes the following issues:
Updated to version 2.2.34.
- CVE-2020-36327: Bundler chooses a dependency source based
on the highest gem version number, which means that a rogue gem
found at a public source may be chosen (bsc#1185842)
- CVE-2021-43809: rubygem-bundler: remote execution via Gemfile argument injection (bsc#1193578)
Patchnames: SUSE-2026-1355,SUSE-SLE-Module-Basesystem-15-SP7-2026-1355
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rubygem-bundler",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThis update for rubygem-bundler fixes the following issues:\n\nUpdated to version 2.2.34.\n\n- CVE-2020-36327: Bundler chooses a dependency source based\n on the highest gem version number, which means that a rogue gem\n found at a public source may be chosen (bsc#1185842)\n \n- CVE-2021-43809: rubygem-bundler: remote execution via Gemfile argument injection (bsc#1193578)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1355,SUSE-SLE-Module-Basesystem-15-SP7-2026-1355",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1355-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1355-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261355-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1355-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045561.html"
},
{
"category": "self",
"summary": "SUSE Bug 1185842",
"url": "https://bugzilla.suse.com/1185842"
},
{
"category": "self",
"summary": "SUSE Bug 1193578",
"url": "https://bugzilla.suse.com/1193578"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36327 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43809 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43809/"
}
],
"title": "Security update for rubygem-bundler",
"tracking": {
"current_release_date": "2026-04-15T13:37:50Z",
"generator": {
"date": "2026-04-15T13:37:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1355-1",
"initial_release_date": "2026-04-15T13:37:50Z",
"revision_history": [
{
"date": "2026-04-15T13:37:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64",
"product": {
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64",
"product_id": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.i586",
"product": {
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.i586",
"product_id": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le",
"product": {
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le",
"product_id": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x",
"product": {
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x",
"product_id": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64",
"product": {
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64",
"product_id": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64"
},
"product_reference": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le"
},
"product_reference": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x"
},
"product_reference": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64"
},
"product_reference": "ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-36327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36327"
}
],
"notes": [
{
"category": "general",
"text": "Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every \"Dependency Confusion\" issue in every product.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36327",
"url": "https://www.suse.com/security/cve/CVE-2020-36327"
},
{
"category": "external",
"summary": "SUSE Bug 1185842 for CVE-2020-36327",
"url": "https://bugzilla.suse.com/1185842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-15T13:37:50Z",
"details": "important"
}
],
"title": "CVE-2020-36327"
},
{
"cve": "CVE-2021-43809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43809"
}
],
"notes": [
{
"category": "general",
"text": "`Bundler` is a package for managing application dependencies in Ruby. In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`\u0027s, it is not expected that they lead to execution of external code, unless that\u0027s explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with invalid, but seemingly harmless, values with a leading dash, this can be false. To handle dependencies that come from a Git repository instead of a registry, Bundler uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Bundler versions before 2.2.33 correctly avoid Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. Since this value comes from the `Gemfile` file, it can contain any character, including a leading dash.\n\nTo exploit this vulnerability, an attacker has to craft a directory containing a `Gemfile` file that declares a dependency that is located in a Git repository. This dependency has to have a Git URL in the form of `-u./payload`. This URL will be used to construct a Git clone command but will be interpreted as the upload-pack argument. Then this directory needs to be shared with the victim, who then needs to run a command that evaluates the Gemfile, such as `bundle lock`, inside.\n\nThis vulnerability can lead to Arbitrary Code Execution, which could potentially lead to the takeover of the system. However, the exploitability is very low, because it requires a lot of user interaction. Bundler 2.2.33 has patched this problem by inserting `--` as an argument before any positional arguments to those Git commands that were affected by this issue. Regardless of whether users can upgrade or not, they should review any untrustred `Gemfile`\u0027s before running any `bundler` commands that may read them, since they can contain arbitrary ruby code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43809",
"url": "https://www.suse.com/security/cve/CVE-2021-43809"
},
{
"category": "external",
"summary": "SUSE Bug 1193578 for CVE-2021-43809",
"url": "https://bugzilla.suse.com/1193578"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:ruby2.5-rubygem-bundler-2.2.34-150700.21.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-15T13:37:50Z",
"details": "important"
}
],
"title": "CVE-2021-43809"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…