Gentoo Archives: gentoo-announce

From: Aaron Bauman <bman@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202006-05 ] Nokogiri: Command injection
Date: Sat, 13 Jun 2020 01:48:14
Message-Id: 20200613010723.GC17996@bubba
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202006-05
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Nokogiri: Command injection
9 Date: June 13, 2020
10 Bugs: #691974
11 ID: 202006-05
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Nokogiri has a vulnerability allowing arbitrary execution of code if a
19 certain function is used.
20
21 Background
22 ==========
23
24 Nokogiri is an HTML, XML, SAX, and Reader parser.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 dev-ruby/nokogiri < 1.10.4 >= 1.10.4
33
34 Description
35 ===========
36
37 A command injection vulnerability in Nokogiri allows commands to be
38 executed in a subprocess by Ruby's Kernel.open method. Processes are
39 vulnerable only if the undocumented method
40 Nokogiri::CSS::Tokenizer#load_file is being passed untrusted user
41 input.
42
43 Impact
44 ======
45
46 A remote attacker could possibly execute arbitrary code with the
47 privileges of the process.
48
49 Workaround
50 ==========
51
52 Avoid calling the undocumented method
53 Nokogiri::CSS::Tokenizer#load_file with untrusted user input.
54
55 Resolution
56 ==========
57
58 All Nokogiri users should upgrade to the latest version:
59
60 # emerge --sync
61 # emerge --ask --oneshot --verbose ">=dev-ruby/nokogiri-1.10.4"
62
63 References
64 ==========
65
66 [ 1 ] CVE-2019-5477
67 https://nvd.nist.gov/vuln/detail/CVE-2019-5477
68 [ 2 ] Upstream bug
69 https://github.com/sparklemotion/nokogiri/issues/1915
70
71 Availability
72 ============
73
74 This GLSA and any updates to it are available for viewing at
75 the Gentoo Security Website:
76
77 https://security.gentoo.org/glsa/202006-05
78
79 Concerns?
80 =========
81
82 Security is a primary focus of Gentoo Linux and ensuring the
83 confidentiality and security of our users' machines is of utmost
84 importance to us. Any security concerns should be addressed to
85 security@g.o or alternatively, you may file a bug at
86 https://bugs.gentoo.org.
87
88 License
89 =======
90
91 Copyright 2020 Gentoo Foundation, Inc; referenced text
92 belongs to its owner(s).
93
94 The contents of this document are licensed under the
95 Creative Commons - Attribution / Share Alike license.
96
97 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature