An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2021-1396 Final 1.0 1.0 2021-10-19 Initial 2021-10-19 2021-10-19 openEuler SA Tool V1.0 2021-10-19 rubygem-nokogiri security update An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2. Nokogiri parses and searches XML/HTML very quickly, and also has correctly implemented CSS3 selector support as well as XPath support. Nokogiri also features an Hpricot compatibility layer to help ease the change to using correct CSS and XPath. %if 0 Security Fix(es): Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for this issue. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.(CVE-2021-41098) An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High rubygem-nokogiri https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1396 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-41098 https://nvd.nist.gov/vuln/detail/CVE-2021-41098 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 rubygem-nokogiri-debuginfo-1.10.5-3.oe1.aarch64.rpm rubygem-nokogiri-1.10.5-3.oe1.aarch64.rpm rubygem-nokogiri-doc-1.10.5-3.oe1.aarch64.rpm rubygem-nokogiri-debugsource-1.10.5-3.oe1.aarch64.rpm rubygem-nokogiri-1.10.5-3.oe1.aarch64.rpm rubygem-nokogiri-debuginfo-1.10.5-3.oe1.aarch64.rpm rubygem-nokogiri-doc-1.10.5-3.oe1.aarch64.rpm rubygem-nokogiri-debugsource-1.10.5-3.oe1.aarch64.rpm rubygem-nokogiri-1.10.5-3.oe1.src.rpm rubygem-nokogiri-1.10.5-3.oe1.src.rpm rubygem-nokogiri-doc-1.10.5-3.oe1.x86_64.rpm rubygem-nokogiri-debugsource-1.10.5-3.oe1.x86_64.rpm rubygem-nokogiri-debuginfo-1.10.5-3.oe1.x86_64.rpm rubygem-nokogiri-1.10.5-3.oe1.x86_64.rpm rubygem-nokogiri-1.10.5-3.oe1.x86_64.rpm rubygem-nokogiri-doc-1.10.5-3.oe1.x86_64.rpm rubygem-nokogiri-debuginfo-1.10.5-3.oe1.x86_64.rpm rubygem-nokogiri-debugsource-1.10.5-3.oe1.x86_64.rpm Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for this issue. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected. 2021-10-19 CVE-2021-41098 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP2 High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N rubygem-nokogiri security update 2021-10-19 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1396