summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTim Smith <tsmith@chef.io>2019-03-06 12:08:29 -0800
committerTim Smith <tsmith@chef.io>2019-03-06 12:08:29 -0800
commit7894cdddfbb2306ef7c477be14d62ae06b8b4bcd (patch)
treeeaa6bcae75466745c7378dbfd673d28c8ad4998a
parent2399a3cfc6e2cbac17eee62005fb104acf937875 (diff)
downloadchef-7894cdddfbb2306ef7c477be14d62ae06b8b4bcd.tar.gz
Bump Rubygems to 2.7.9 and add that to the release notes
Use the latest / greatest Signed-off-by: Tim Smith <tsmith@chef.io>
-rw-r--r--RELEASE_NOTES.md13
-rw-r--r--omnibus_overrides.rb2
2 files changed, 12 insertions, 3 deletions
diff --git a/RELEASE_NOTES.md b/RELEASE_NOTES.md
index 10cc803308..2695b8264c 100644
--- a/RELEASE_NOTES.md
+++ b/RELEASE_NOTES.md
@@ -35,7 +35,6 @@ InSpec has been updated from 3.4.1 to 3.7.1. This new release contains improveme
## Updated Components
- bundler 1.16.1 -> 1.17.3
-- rubygems 2.7.6 -> 2.7.8
- libxml2 2.9.7 -> 2.9.9
- ca-certs updated to 2019-01-22 for new roots
@@ -43,7 +42,17 @@ InSpec has been updated from 3.4.1 to 3.7.1. This new release contains improveme
### OpenSSL
-OpenSSL has been updated to 1.0.2r in order to resolve ([CVE-2019-1559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559))
+OpenSSL has been updated to 1.0.2r in order to resolve [CVE-2019-1559](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559)
+
+### RubyGems
+
+RubyGems has been updated to 2.7.9 in order to resolve the following CVEs:
+ - [CVE-2019-8320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8320): Delete directory using symlink when decompressing tar
+ - [CVE-2019-8321](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8321): Escape sequence injection vulnerability in verbose
+ - [CVE-2019-8322](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8322): Escape sequence injection vulnerability in gem owner
+ - [CVE-2019-8323](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8323): Escape sequence injection vulnerability in API response handling
+ - [CVE-2019-8324](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8324): Installing a malicious gem may lead to arbitrary code execution
+ - [CVE-2019-8325](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8325): Escape sequence injection vulnerability in errors
# Chef Client Release Notes 14.10:
diff --git a/omnibus_overrides.rb b/omnibus_overrides.rb
index ffd6875d2a..1b789bc926 100644
--- a/omnibus_overrides.rb
+++ b/omnibus_overrides.rb
@@ -4,7 +4,7 @@
#
# NOTE: You MUST update omnibus-software when adding new versions of
# software here: bundle exec rake dependencies:update_omnibus_gemfile_lock
-override :rubygems, version: "2.7.8"
+override :rubygems, version: "2.7.9"
override :bundler, version: "1.17.3"
override "nokogiri", version: "1.10.1"
override "libffi", version: "3.2.1"