Upstream information
Description
There is an OS command injection vulnerability in Ruby RakeSUSE information
Overall state of this security issue: Pending
This issue is currently rated as having moderate severity.
National Vulnerability Database | |
---|---|
Base Score | 6.9 |
Vector | AV:L/AC:M/Au:N/C:C/I:C/A:C |
Access Vector | Local |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
National Vulnerability Database | SUSE | |
---|---|---|
Base Score | 6.4 | 5 |
Vector | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H | CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L |
Access Vector | Local | Local |
Access Complexity | High | High |
Privileges Required | High | High |
User Interaction | None | None |
Scope | Unchanged | Changed |
Confidentiality Impact | High | Low |
Integrity Impact | High | Low |
Availability Impact | High | Low |
CVSSv3 Version | 3.1 | 3.1 |
- SUSE-SU-2020:0737-1, published Fri Mar 20 11:13:12 MDT 2020
- openSUSE-SU-2020:0395-1, published Sun, 29 Mar 2020 00:16:31 +0100 (CET)
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
Image SLES15-EC2-CHOST-HVM-BYOS Image SLES15-SP1-CHOST-BYOS-Azure Image SLES15-SP1-CHOST-BYOS-EC2 Image SLES15-SP1-CHOST-BYOS-GCE Image SLES15-SP2-CHOST-BYOS-Ali Image SLES15-SP2-CHOST-BYOS-Azure Image SLES15-SP2-CHOST-BYOS-EC2 Image SLES15-SP2-CHOST-BYOS-GCE Image SLES15-SP2-CHOST-BYOS-OpenStack |
| |
SUSE Linux Enterprise High Performance Computing 15-ESPOS SUSE Linux Enterprise High Performance Computing 15-LTSS |
| Patchnames: SUSE-SLE-Product-HPC-15-2020-737 |
SUSE Linux Enterprise Module for Basesystem 15 SP1 |
| Patchnames: SUSE-SLE-Module-Basesystem-15-SP1-2020-737 |
SUSE Linux Enterprise Module for Basesystem 15 SP2 |
| |
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SP1 |
| Patchnames: SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2020-737 |
SUSE Linux Enterprise Server 15-LTSS |
| Patchnames: SUSE-SLE-Product-SLES-15-2020-737 |
SUSE Linux Enterprise Server for SAP Applications 15 |
| Patchnames: SUSE-SLE-Product-SLES_SAP-15-2020-737 |
openSUSE Leap 15.1 |
| Patchnames: openSUSE-2020-395 |
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
Product(s) | Source package | State |
---|---|---|
SUSE CaaS Platform 4.0 | ruby2.5 | Released |
SUSE Enterprise Storage 6 | ruby2.5 | Released |
SUSE Linux Enterprise 12 Module for Containers | rubygem-rake | Affected |
SUSE Linux Enterprise 15-SP1 Module for Basesystem | ruby2.5 | Released |
SUSE Linux Enterprise 15-SP2 Module for Basesystem | ruby2.5 | Released |
SUSE Linux Enterprise High Performance Computing 15 LTSS | ruby2.5 | Released |
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS | ruby2.5 | Released |
SUSE Linux Enterprise Server 15 LTSS | ruby2.5 | Released |
SUSE Linux Enterprise Server 15 SP1 Business Critical Linux | ruby2.5 | Released |
SUSE Linux Enterprise Server 15 SP1 LTSS | ruby2.5 | Released |
SUSE Linux Enterprise Server ESPOS 15 | ruby2.5 | Released |
SUSE Linux Enterprise Server for SAP Applications 15 | ruby2.5 | Released |
SUSE Linux Enterprise Server for SAP Applications 15 SP1 | ruby2.5 | Released |
SUSE Manager Proxy 4.0 | ruby2.5 | Released |
SUSE Manager Retail Branch Server 4.0 | ruby2.5 | Released |
SUSE Manager Server 4.0 | ruby2.5 | Released |