-
-
Notifications
You must be signed in to change notification settings - Fork 903
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate Ubuntu libxml2 patches in USN-3424-1 #1673
Comments
It's likely that upgrading to libxml 2.9.5 will pull in these patches, I need to confirm that. If that's the case I expect to be able to turn around an update today. |
checking if these patches are all in 2.9.5, looks like they are (note two patches are repeated in two CVEs):
|
OK, mitigation is going to be updating nokogiri to libxml 2.9.5, which is actually master and ready to release. |
v1.8.1 has shipped, updating nokogiri to libxml 2.9.5. |
Thanks for your hard work, as always! |
🙇 |
👏 |
This fixes a libxml vulnerability, see: sparklemotion/nokogiri#1673
Security vulnerabilities identified in libxml2 as used by nokogiri. Affected versions: Prior to 1.8.1 Fixed versions: 1.8.1 Identifier: USN-3424-1 Solution: Upgrade to latest version. Source: sparklemotion/nokogiri#1673
This fixes a security vulnerability with the libxml parser. You can read more about it here: sparklemotion/nokogiri#1673
Security vulnerabilities identified in libxml2 as used by nokogiri. Affected versions: Prior to 1.8.1 Fixed versions: 1.8.1 Identifier: USN-3424-1 Solution: Upgrade to latest version. Source: sparklemotion/nokogiri#1673
More info on vulnerability (fixed in v1.8.1): sparklemotion/nokogiri#1673 This also updates lots of other assorted gems that were a little behind, but doesn't touch some that have had major revisions (e.g. JWT, which I still need to look into and upgrade).
More info on vulnerability (fixed in v1.8.1): sparklemotion/nokogiri#1673 This also updates lots of other assorted gems that were a little behind, but doesn't touch some that have had major revisions (e.g. JWT, which I still need to look into and upgrade).
More info on vulnerability (fixed in v1.8.1): sparklemotion/nokogiri#1673 This also updates lots of other assorted gems that were a little behind, but doesn't touch some that have had major revisions (e.g. JWT, which I still need to look into and upgrade).
Name: nokogiri Version: 1.7.2 Advisory: CVE-2017-9050 Criticality: Unknown URL: sparklemotion/nokogiri#1673 Title: Nokogiri gem, via libxml, is affected by DoS and RCE vulnerabilities Solution: upgrade to >= 1.8.1
* Maybe I should write a script to automatically update nokogiri :) ruby-advisory-db: 288 advisories Name: nokogiri Version: 1.7.0.1 Advisory: CVE-2016-4658 Criticality: Unknown URL: sparklemotion/nokogiri#1615 Title: Nokogiri gem contains several vulnerabilities in libxml2 and libxslt Solution: upgrade to >= 1.7.1 Name: nokogiri Version: 1.7.0.1 Advisory: CVE-2017-5029 Criticality: Unknown URL: sparklemotion/nokogiri#1634 Title: Nokogiri gem contains two upstream vulnerabilities in libxslt 1.1.29 Solution: upgrade to >= 1.7.2 Name: nokogiri Version: 1.7.0.1 Advisory: CVE-2017-9050 Criticality: Unknown URL: sparklemotion/nokogiri#1673 Title: Nokogiri gem, via libxml, is affected by DoS and RCE vulnerabilities Solution: upgrade to >= 1.8.1
URL: sparklemotion/nokogiri#1673 Title: Nokogiri gem, via libxml, is affected by DoS and RCE vulnerabilities
URL: sparklemotion/nokogiri#1673 Title: Nokogiri gem, via libxml, is affected by DoS and RCE vulnerabilities
Name: nokogiri Version: 1.8.0 Advisory: CVE-2017-9050 Criticality: Unknown URL: sparklemotion/nokogiri#1673 Title: Nokogiri gem, via libxml, is affected by DoS and RCE vulnerabilities Solution: upgrade to >= 1.8.1
Based on the work done in the nokogiri project to address multiple CVEs in libxml2 and libxslt. https://usn.ubuntu.com/usn/usn-3424-1/ CVE-2017-0663, CVE-2017-7375, CVE-2017-7376, CVE-2017-9047, CVE-2017-9048, CVE-2017-9049, CVE-2017-9050 sparklemotion/nokogiri#1673 sparklemotion/nokogiri#1670 SHA256 generated from downloads. Downloads verified with GPG: gpg --verify libxml2-2.9.5.tar.gz.asc libxml2-2.9.5.tar.gz gpg: Signature made Mon Sep 4 09:00:53 2017 EDT using RSA key ID 596BEA5D gpg: Good signature from "Daniel Veillard (Red Hat work email) <[email protected]>" [unknown] gpg: aka "Daniel Veillard <[email protected]>" [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: C744 15BA 7C9C 7F78 F02E 1DC3 4606 B8A5 DE95 BC1F Subkey fingerprint: DB46 681B B91A DCEA 170F A2D4 1558 8B26 596B EA5D gpg --verify libxslt-1.1.30.tar.gz.asc libxslt-1.1.30.tar.gz gpg: Signature made Mon Sep 4 09:36:06 2017 EDT using RSA key ID 596BEA5D gpg: Good signature from "Daniel Veillard (Red Hat work email) <[email protected]>" [unknown] gpg: aka "Daniel Veillard <[email protected]>" [unknown] gpg: WARNING: This key is not certified with a trusted signature! gpg: There is no indication that the signature belongs to the owner. Primary key fingerprint: C744 15BA 7C9C 7F78 F02E 1DC3 4606 B8A5 DE95 BC1F Subkey fingerprint: DB46 681B B91A DCEA 170F A2D4 1558 8B26 596B EA5D Signed-off-by: Robb Kidd <[email protected]>
…otion/nokogiri#1673) and [CVE-2017-5029](sparklemotion/nokogiri#1634) Added branch on my fork of savon until PR savonrb/savon#848 has been merged
Name: actionview Version: 4.2.6 Advisory: CVE-2016-6316 URL: https://groups.google.com/forum/#!topic/rubyonrails-security/I-VWr034ouk Title: Possible XSS Vulnerability in Action View Solution: upgrade to ~> 4.2.7.1, ~> 4.2.8, >= 5.0.0.1 Name: activerecord Version: 4.2.6 Advisory: CVE-2016-6317 URL: https://groups.google.com/forum/#!topic/rubyonrails-security/rgO20zYW33s Title: Unsafe Query Generation Risk in Active Record Solution: upgrade to >= 4.2.7.1 Name: nokogiri Version: 1.6.7.2 Advisory: CVE-2017-9050 URL: sparklemotion/nokogiri#1673 Title: Nokogiri gem, via libxml, is affected by DoS and RCE vulnerabilities Solution: upgrade to >= 1.8.1 Name: nokogiri Version: 1.6.7.2 Advisory: CVE-2016-4658 URL: sparklemotion/nokogiri#1615 Title: Nokogiri gem contains several vulnerabilities in libxml2 and libxslt Solution: upgrade to >= 1.7.1 Name: nokogiri Version: 1.6.7.2 Advisory: CVE-2015-8806 URL: sparklemotion/nokogiri#1473 Title: Denial of service or RCE from libxml2 and libxslt Solution: upgrade to >= 1.6.8 Name: nokogiri Version: 1.6.7.2 Advisory: CVE-2017-5029 URL: sparklemotion/nokogiri#1634 Title: Nokogiri gem contains two upstream vulnerabilities in libxslt 1.1.29 Solution: upgrade to >= 1.7.2
The currently installed version has a security advisory: ``` Name: nokogiri Version: 1.8.0 Advisory: CVE-2017-9050 Criticality: Unknown URL: sparklemotion/nokogiri#1673 Title: Nokogiri gem, via libxml, is affected by DoS and RCE vulnerabilities Solution: upgrade to >= 1.8.1 ```
xml-kit specifies a minimum version that has fixes for nokogiri that ships a version of libxml that does not have a CVE. sparklemotion/nokogiri#1673
This is to address a vulnerability, for further details: sparklemotion/nokogiri#1673
Earlier versions of Nokogiri have security issues as follows: [CVE-2016-4658](sparklemotion/nokogiri#1615) [CVE-2017-5029](sparklemotion/nokogiri#1634) [CVE-2017-9050](sparklemotion/nokogiri#1673) [CVE-2017-16932](sparklemotion/nokogiri#1714) [CVE-2017-15412](sparklemotion/nokogiri#1714)
Earlier versions of Nokogiri have security issues as follows: [CVE-2016-4658](sparklemotion/nokogiri#1615) [CVE-2017-5029](sparklemotion/nokogiri#1634) [CVE-2017-9050](sparklemotion/nokogiri#1673) [CVE-2017-16932](sparklemotion/nokogiri#1714) [CVE-2017-15412](sparklemotion/nokogiri#1714)
Earlier versions of Nokogiri have security issues as follows: [CVE-2016-4658](sparklemotion/nokogiri#1615) [CVE-2017-5029](sparklemotion/nokogiri#1634) [CVE-2017-9050](sparklemotion/nokogiri#1673) [CVE-2017-16932](sparklemotion/nokogiri#1714) [CVE-2017-15412](sparklemotion/nokogiri#1714)
Name: nokogiri Version: 1.7.2 Advisory: CVE-2017-9050 Criticality: Unknown URL: sparklemotion/nokogiri#1673 Title: Nokogiri gem, via libxml, is affected by DoS and RCE vulnerabilities Solution: upgrade to >= 1.8.1
Name: nokogiri Version: 1.7.2 Advisory: CVE-2017-9050 Criticality: Unknown URL: sparklemotion/nokogiri#1673 Title: Nokogiri gem, via libxml, is affected by DoS and RCE vulnerabilities Solution: upgrade to >= 1.8.1
The text was updated successfully, but these errors were encountered: