Gentoo Forums
Gentoo Forums
Gentoo Forums
Quick Search: in
[ GLSA 202006-05 ] Nokogiri
View unanswered posts
View posts from last 24 hours

 
Reply to topic    Gentoo Forums Forum Index News & Announcements
View previous topic :: View next topic  
Author Message
GLSA
Advocate
Advocate


Joined: 12 May 2004
Posts: 2663

PostPosted: Sat Jun 13, 2020 2:26 am    Post subject: [ GLSA 202006-05 ] Nokogiri Reply with quote

Gentoo Linux Security Advisory

Title: Nokogiri: Command injection (GLSA 202006-05)
Severity: normal
Exploitable: remote
Date: 2020-06-13
Bug(s): #691974
ID: 202006-05

Synopsis

Nokogiri has a vulnerability allowing arbitrary execution of code
if a certain function is used.


Background

Nokogiri is an HTML, XML, SAX, and Reader parser.

Affected Packages

Package: dev-ruby/nokogiri
Vulnerable: < 1.10.4
Unaffected: >= 1.10.4
Architectures: All supported architectures


Description

A command injection vulnerability in Nokogiri allows commands to be
executed in a subprocess by Ruby’s Kernel.open method. Processes are
vulnerable only if the undocumented method
Nokogiri::CSS::Tokenizer#load_file is being passed untrusted user input.


Impact

A remote attacker could possibly execute arbitrary code with the
privileges of the process.


Workaround

Avoid calling the undocumented method Nokogiri::CSS::Tokenizer#load_file
with untrusted user input.


Resolution

All Nokogiri users should upgrade to the latest version:
Code:
# emerge --sync
      # emerge --ask --oneshot --verbose ">=dev-ruby/nokogiri-1.10.4"
   


References

CVE-2019-5477
Upstream
bug
Back to top
View user's profile Send private message
Display posts from previous:   
Reply to topic    Gentoo Forums Forum Index News & Announcements All times are GMT
Page 1 of 1

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum