Skip to content

Commit 2cb9a86

Browse files
jasnowRubySec CI
authored and
RubySec CI
committedMar 19, 2024
Updated advisory posts against rubysec/ruby-advisory-db@35ca69b
1 parent cbed83c commit 2cb9a86

File tree

2 files changed

+94
-0
lines changed

2 files changed

+94
-0
lines changed
 
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-28862 (rotp): ROTP 6.2.2 and 6.2.1 has 0666 permissions for the .rb
4+
files.'
5+
comments: false
6+
categories:
7+
- rotp
8+
advisory:
9+
gem: rotp
10+
cve: 2024-28862
11+
ghsa: x2h8-qmj4-g62f
12+
url: https://github.com/mdp/rotp/security/advisories/GHSA-x2h8-qmj4-g62f
13+
title: ROTP 6.2.2 and 6.2.1 has 0666 permissions for the .rb files.
14+
date: 2024-03-18
15+
description: |
16+
The Ruby One Time Password library (ROTP) is an open source library
17+
for generating and validating one time passwords. Affected versions
18+
had overly permissive default permissions. Users should patch to
19+
version 6.3.0. Users unable to patch may correct file permissions
20+
after installation.
21+
cvss_v3: 5.3
22+
unaffected_versions:
23+
- "< 6.2.1"
24+
patched_versions:
25+
- ">= 6.3.0"
26+
related:
27+
url:
28+
- https://nvd.nist.gov/vuln/detail/CVE-2024-28862
29+
- https://github.com/mdp/rotp/security/advisories/GHSA-x2h8-qmj4-g62f
30+
- https://github.com/advisories/GHSA-x2h8-qmj4-g62f
31+
---
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
layout: advisory
3+
title: 'GHSA-vcc3-rw6f-jv97 (nokogiri): Use-after-free in libxml2 via Nokogiri::XML::Reader'
4+
comments: false
5+
categories:
6+
- nokogiri
7+
advisory:
8+
gem: nokogiri
9+
ghsa: vcc3-rw6f-jv97
10+
url: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xc9x-jj77-9p9j
11+
title: Use-after-free in libxml2 via Nokogiri::XML::Reader
12+
date: 2024-03-18
13+
description: |2
14+
15+
### Summary
16+
17+
Nokogiri upgrades its dependency libxml2 as follows:
18+
- v1.15.6 upgrades libxml2 to 2.11.7 from 2.11.6
19+
- v1.16.2 upgrades libxml2 to 2.12.5 from 2.12.4
20+
21+
libxml2 v2.11.7 and v2.12.5 address the following vulnerability:
22+
23+
CVE-2024-25062 / https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062
24+
- described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/604
25+
- patched by https://gitlab.gnome.org/GNOME/libxml2/-/commit/92721970
26+
27+
Please note that this advisory only applies to the CRuby implementation
28+
of Nokogiri, and only if the packaged libraries are being used. If
29+
you've overridden defaults at installation time to use system libraries
30+
instead of packaged libraries, you should instead pay attention to
31+
your distro's libxml2 release announcements.
32+
33+
JRuby users are not affected.
34+
35+
### Severity
36+
37+
The Nokogiri maintainers have evaluated this as **Moderate**.
38+
39+
### Impact
40+
41+
From the CVE description, this issue applies to the `xmlTextReader`
42+
module (which underlies `Nokogiri::XML::Reader`):
43+
44+
> When using the XML Reader interface with DTD validation and
45+
> XInclude expansion enabled, processing crafted XML documents
46+
> can lead to an xmlValidatePopElement use-after-free.
47+
48+
### Mitigation
49+
50+
Upgrade to Nokogiri `~> 1.15.6` or `>= 1.16.2`.
51+
52+
Users who are unable to upgrade Nokogiri may also choose a more
53+
complicated mitigation: compile and link Nokogiri against patched
54+
external libxml2 libraries which will also address these same issues.
55+
patched_versions:
56+
- "~> 1.15.6"
57+
- ">= 1.16.2"
58+
related:
59+
url:
60+
- https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xc9x-jj77-9p9j
61+
- https://vulners.com/github/GHSA-VCC3-RW6F-JV97
62+
- https://github.com/advisories/GHSA-vcc3-rw6f-jv97
63+
---

0 commit comments

Comments
 (0)
Please sign in to comment.