Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2021:0237-1

Опубликовано: 05 фев. 2021
Источник: suse-cvrf

Описание

Security update for rubygem-nokogiri

This update for rubygem-nokogiri fixes the following issues:

rubygem-nokogiri was updated to 1.8.5 (bsc#1156722).

Security issues fixed:

  • CVE-2019-5477: Fixed a command injection vulnerability (bsc#1146578).
  • CVE-2020-26247: Fixed an XXE vulnerability in Nokogiri::XML::Schema (bsc#1180507).

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.2
ruby2.5-rubygem-nokogiri-1.8.5-lp152.4.3.1
ruby2.5-rubygem-nokogiri-doc-1.8.5-lp152.4.3.1
ruby2.5-rubygem-nokogiri-testsuite-1.8.5-lp152.4.3.1

Описание

A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.


Затронутые продукты
openSUSE Leap 15.2:ruby2.5-rubygem-nokogiri-1.8.5-lp152.4.3.1
openSUSE Leap 15.2:ruby2.5-rubygem-nokogiri-doc-1.8.5-lp152.4.3.1
openSUSE Leap 15.2:ruby2.5-rubygem-nokogiri-testsuite-1.8.5-lp152.4.3.1

Ссылки

Описание

Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.


Затронутые продукты
openSUSE Leap 15.2:ruby2.5-rubygem-nokogiri-1.8.5-lp152.4.3.1
openSUSE Leap 15.2:ruby2.5-rubygem-nokogiri-doc-1.8.5-lp152.4.3.1
openSUSE Leap 15.2:ruby2.5-rubygem-nokogiri-testsuite-1.8.5-lp152.4.3.1

Ссылки