Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4100 USN-4175-1: Nokogiri vulnerability 6 November 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: ruby-nokogiri Publisher: Ubuntu Operating System: Ubuntu Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-5477 Reference: ESB-2019.3854 ESB-2019.3628 ESB-2019.4048.2 Original Bulletin: https://usn.ubuntu.com/4175-1/ - --------------------------BEGIN INCLUDED TEXT-------------------- USN-4175-1: Nokogiri vulnerability 5 November 2019 ruby-nokogiri vulnerability A security issue affects these releases of Ubuntu and its derivatives: o Ubuntu 19.10 o Ubuntu 19.04 o Ubuntu 18.04 LTS o Ubuntu 16.04 LTS Summary Nokogiri could be made to execute programs if it received specially crafted input. Software Description o ruby-nokogiri - HTML, XML, SAX, and Reader parser for Ruby Details It was discovered that Nokogiri incorrectly handled inputs. A remote attacker could possibly use this issue to execute arbitrary OS commands. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 19.10 ruby-nokogiri - 1.10.3+dfsg1-2ubuntu0.1 Ubuntu 19.04 ruby-nokogiri - 1.10.0+dfsg1-2ubuntu0.1 Ubuntu 18.04 LTS ruby-nokogiri - 1.8.2-1ubuntu0.1 Ubuntu 16.04 LTS ruby-nokogiri - 1.6.7.2-3ubuntu0.1 To update your system, please follow these instructions: https:// wiki.ubuntu.com/Security/Upgrades . In general, a standard system update will make all the necessary changes. References o CVE-2019-5477 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXcIGMGaOgq3Tt24GAQhUeRAArQjOn+94h15mQmcV5Lid09GWU0M+236Y kRIgvqVKWNmrkH6OsrRrXMch7q5Ouzmpj28WTF3D3h3q5C/lHwHZv/HLgreEPido QDPXGszFSC5aeVkyezcVt4ewiNI29j3+R6JMBnygngJp+BznnodBFgrUzcXPS7Z2 T0Z2yGnzX9zlGQI2xxMHypomdxryQV8/X87o5efxCGFg+z+GBzKIqFgSBW+gMEl5 kGrMopIITloR59kM3hjagOx4aYGm+xhc9KvOjlxt9UvzskJiIe+f950UOc1PgpEY stqzNl+8bd0teIHg4FrrEHo9eMw46yTIJQfmbJIGxwPSE5e1AcPhP5SW2qpFV/9e InD9vgLkEbKPGMohTKK2Q+Tcvtfdls/+TRY6tTU6XsxrTO2WK277WwADg6+Ozlgh kcBypcVHPwIROekRobQlrbjMwBpHjrJKmmr+a/LuhcJALMtnKoLKY+by3CFphJGW dimG9ex/h6H1umoQ8MKOV72xXwL8Xope7UVJIZHO4e1Xenw5OTB/EUdNPU/GaYPt rKscK+SBIfikwiX/VOSu2buSp5e0OVK87Px1h9XSq+Hyaffb8dT+Pn/xiEjdKlcO 8Lg27Ja/dl5W+SU9QHq4eeR0J8v3dJv8c6pu7mPmJpiKw8/4pE47mLJ3yJrkWUUJ HH05Og00yhc= =vdSe -----END PGP SIGNATURE-----