Bug 1152245 - (CVE-2019-16892) VUL-1: CVE-2019-16892: rubygem-rubyzip: bypass application checks on ZIP entry sizes
(CVE-2019-16892)
VUL-1: CVE-2019-16892: rubygem-rubyzip: bypass application checks on ZIP entr...
Status: NEW
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Basesystem
Leap 15.1
Other Other
: P4 - Low : Minor (vote)
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/243313/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-09-27 08:42 UTC by Alexander Bergmann
Modified: 2020-05-04 12:06 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2019-09-27 08:42:01 UTC
CVE-2019-16892

In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP
entry sizes because data about the uncompressed size can be spoofed. This allows
attackers to cause a denial of service (disk consumption).

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-16892
http://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-16892.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16892
http://www.cvedetails.com/cve/CVE-2019-16892/
https://github.com/rubyzip/rubyzip/pull/403
Comment 1 Stephan Kulow 2020-05-04 12:06:17 UTC
leap 15.2 got 1.3.0 - and that's good enough for me. I don't maintain this package, I just got a bot to update them.

recommend to WONTFIX