csaf2cusa/cvrfs/2022/cvrf-openEuler-SA-2022-1644.xml
Jia Chao 0b84f3c661 增加测试用的配置和目录
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-02 15:51:55 +08:00

126 lines
9.7 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2022-1644</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2022-05-11</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2022-05-11</InitialReleaseDate>
<CurrentReleaseDate>2022-05-11</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2022-05-11</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">rubygem-nokogiri security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Nokogiri parses and searches XML/HTML very quickly, and also has correctly implemented CSS3 selector support as well as XPath support. Nokogiri also features an Hpricot compatibility layer to help ease the change to using correct CSS and XPath.
Security Fix(es):
Nokogiri is an open source XML and HTML library for Ruby. Nokogiri less than v1.13.4 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. Users are advised to upgrade to Nokogiri >= 1.13.4. There are no known workarounds for this issue.(CVE-2022-24836)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for rubygem-nokogiri is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">rubygem-nokogiri</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1644</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-24836</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2022-24836</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-20.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">openEuler-20.03-LTS-SP1</FullProductName>
<FullProductName ProductID="openEuler-20.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">openEuler-20.03-LTS-SP3</FullProductName>
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="rubygem-nokogiri-1.10.5-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-1.10.5-4.oe1.src.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-1.10.5-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">rubygem-nokogiri-1.10.5-5.oe1.src.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-1.13.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">rubygem-nokogiri-1.13.1-2.oe2203.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="rubygem-nokogiri-1.10.5-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-1.10.5-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debuginfo-1.10.5-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-debuginfo-1.10.5-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debugsource-1.10.5-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-debugsource-1.10.5-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-doc-1.10.5-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-doc-1.10.5-4.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-1.10.5-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">rubygem-nokogiri-1.10.5-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debuginfo-1.10.5-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">rubygem-nokogiri-debuginfo-1.10.5-5.oe1.aarch64.rpm </FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debugsource-1.10.5-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">rubygem-nokogiri-debugsource-1.10.5-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-doc-1.10.5-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">rubygem-nokogiri-doc-1.10.5-5.oe1.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-1.13.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">rubygem-nokogiri-1.13.1-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debuginfo-1.13.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">rubygem-nokogiri-debuginfo-1.13.1-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debugsource-1.13.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">rubygem-nokogiri-debugsource-1.13.1-2.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-doc-1.13.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">rubygem-nokogiri-doc-1.13.1-2.oe2203.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="rubygem-nokogiri-1.10.5-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-1.10.5-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debuginfo-1.10.5-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-debuginfo-1.10.5-4.oe1.x86_64.rpm </FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debugsource-1.10.5-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-debugsource-1.10.5-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-doc-1.10.5-4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP1">rubygem-nokogiri-doc-1.10.5-4.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-1.10.5-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">rubygem-nokogiri-1.10.5-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debuginfo-1.10.5-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">rubygem-nokogiri-debuginfo-1.10.5-5.oe1.x86_64.rpm </FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debugsource-1.10.5-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">rubygem-nokogiri-debugsource-1.10.5-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-doc-1.10.5-5" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP3">rubygem-nokogiri-doc-1.10.5-5.oe1.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-1.13.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">rubygem-nokogiri-1.13.1-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debuginfo-1.13.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">rubygem-nokogiri-debuginfo-1.13.1-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-debugsource-1.13.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">rubygem-nokogiri-debugsource-1.13.1-2.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="rubygem-nokogiri-doc-1.13.1-2" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">rubygem-nokogiri-doc-1.13.1-2.oe2203.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nokogiri parses and searches XML/HTML very quickly, and also has correctly implemented CSS3 selector support as well as XPath support. Nokogiri also features an Hpricot compatibility layer to help ease the change to using correct CSS and XPath.</Note>
</Notes>
<ReleaseDate>2022-05-11</ReleaseDate>
<CVE>CVE-2022-24836</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-20.03-LTS-SP1</ProductID>
<ProductID>openEuler-20.03-LTS-SP3</ProductID>
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>rubygem-nokogiri security update</Description>
<DATE>2022-05-11</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1644</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>