An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2021-1396
Final
1.0
1.0
2021-10-19
Initial
2021-10-19
2021-10-19
openEuler SA Tool V1.0
2021-10-19
rubygem-nokogiri security update
An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
Nokogiri parses and searches XML/HTML very quickly, and also has correctly implemented CSS3 selector support as well as XPath support. Nokogiri also features an Hpricot compatibility layer to help ease the change to using correct CSS and XPath. %if 0
Security Fix(es):
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for this issue. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.(CVE-2021-41098)
An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1 and openEuler-20.03-LTS-SP2.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
High
rubygem-nokogiri
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1396
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-41098
https://nvd.nist.gov/vuln/detail/CVE-2021-41098
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
rubygem-nokogiri-debuginfo-1.10.5-3.oe1.aarch64.rpm
rubygem-nokogiri-1.10.5-3.oe1.aarch64.rpm
rubygem-nokogiri-doc-1.10.5-3.oe1.aarch64.rpm
rubygem-nokogiri-debugsource-1.10.5-3.oe1.aarch64.rpm
rubygem-nokogiri-1.10.5-3.oe1.aarch64.rpm
rubygem-nokogiri-debuginfo-1.10.5-3.oe1.aarch64.rpm
rubygem-nokogiri-doc-1.10.5-3.oe1.aarch64.rpm
rubygem-nokogiri-debugsource-1.10.5-3.oe1.aarch64.rpm
rubygem-nokogiri-1.10.5-3.oe1.src.rpm
rubygem-nokogiri-1.10.5-3.oe1.src.rpm
rubygem-nokogiri-doc-1.10.5-3.oe1.x86_64.rpm
rubygem-nokogiri-debugsource-1.10.5-3.oe1.x86_64.rpm
rubygem-nokogiri-debuginfo-1.10.5-3.oe1.x86_64.rpm
rubygem-nokogiri-1.10.5-3.oe1.x86_64.rpm
rubygem-nokogiri-1.10.5-3.oe1.x86_64.rpm
rubygem-nokogiri-doc-1.10.5-3.oe1.x86_64.rpm
rubygem-nokogiri-debuginfo-1.10.5-3.oe1.x86_64.rpm
rubygem-nokogiri-debugsource-1.10.5-3.oe1.x86_64.rpm
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for this issue. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.
2021-10-19
CVE-2021-41098
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP2
High
7.5
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
rubygem-nokogiri security update
2021-10-19
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1396