cvrf2cusa/cvrf/2021/cvrf-openEuler-SA-2021-1144.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

105 lines
6.6 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2021-1144</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2021-04-07</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2021-04-07</InitialReleaseDate>
<CurrentReleaseDate>2021-04-07</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2021-04-07</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">rubygem-nokogiri security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Nokogiri parses and searches XML/HTML very quickly, and also has correctly implemented CSS3 selector support as well as XPath support. Nokogiri also features an Hpricot compatibility layer to help ease the change to using correct CSS and XPath.
Security Fix(es):
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.(CVE-2020-26247)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Medium</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">rubygem-nokogiri</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1144</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://openeuler.org/en/security/cve/detail.html?id=CVE-2020-26247</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2020-26247</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="rubygem-nokogiri-debuginfo-1.10.5-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-debuginfo-1.10.5-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-1.10.5-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-1.10.5-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debugsource-1.10.5-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-debugsource-1.10.5-2.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-doc-1.10.5-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-doc-1.10.5-2.oe1.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="rubygem-nokogiri-1.10.5-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-1.10.5-2.oe1.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="rubygem-nokogiri-debuginfo-1.10.5-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-debuginfo-1.10.5-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-doc-1.10.5-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-doc-1.10.5-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-1.10.5-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-1.10.5-2.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debugsource-1.10.5-2" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-debugsource-1.10.5-2.oe1.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri before version 1.11.0.rc4 there is an XXE vulnerability. XML Schemas parsed by Nokogiri::XML::Schema are trusted by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks. This behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as untrusted by default whenever possible. This is fixed in Nokogiri version 1.11.0.rc4.</Note>
</Notes>
<ReleaseDate>2021-04-07</ReleaseDate>
<CVE>CVE-2020-26247</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>4.3</BaseScore>
<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>rubygem-nokogiri security update</Description>
<DATE>2021-04-07</DATE>
<URL>https://openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2021-1144</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>