git: cbbdab46f9b7 - main - security/vuxml: Document XML round-trip vulnerability of REXML in Ruby
Koichiro Iwao
meta at FreeBSD.org
Tue Apr 6 13:54:22 UTC 2021
The branch main has been updated by meta:
URL: https://cgit.FreeBSD.org/ports/commit/?id=cbbdab46f9b73b3593fb453c4a2523936d569e15
commit cbbdab46f9b73b3593fb453c4a2523936d569e15
Author: Koichiro Iwao <meta at FreeBSD.org>
AuthorDate: 2021-04-05 14:42:08 +0000
Commit: Koichiro Iwao <meta at FreeBSD.org>
CommitDate: 2021-04-06 13:53:57 +0000
security/vuxml: Document XML round-trip vulnerability of REXML in Ruby
Document XML round-trip vulnerability of REXML in Ruby.
PR: 254793
Reported by: Yasuhiro Kimura <yasu at utahime.org>
Security: CVE-2021-28965
---
security/vuxml/vuln.xml | 39 +++++++++++++++++++++++++++++++++++++++
1 file changed, 39 insertions(+)
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e4ead1bdaa63..5c930b476433 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -78,6 +78,45 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="dec7e4b6-961a-11eb-9c34-080027f515ea">
+ <topic>ruby -- XML round-trip vulnerability in REXML</topic>
+ <affects>
+ <package>
+ <name>ruby</name>
+ <range><ge>2.5.0,1</ge><lt>2.5.9,1</lt></range>
+ <range><ge>2.6.0,1</ge><lt>2.6.7,1</lt></range>
+ <range><ge>2.7.0,1</ge><lt>2.7.3,1</lt></range>
+ <range><ge>3.0.0.p1,1</ge><lt>3.0.1,1</lt></range>
+ </package>
+ <package>
+ <name>rubygem-rexml</name>
+ <range><lt>3.2.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Juho Nurminen reports:</p>
+ <blockquote cite="https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/">
+ <p>
+ When parsing and serializing a crafted XML document, REXML gem
+ (including the one bundled with Ruby) can create a wrong XML
+ document whose structure is different from the original one.
+ The impact of this issue highly depends on context, but it may
+ lead to a vulnerability in some programs that are using REXML.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-28965</cvename>
+ <url>https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/</url>
+ </references>
+ <dates>
+ <discovery>2021-04-05</discovery>
+ <entry>2021-04-05</entry>
+ </dates>
+ </vuln>
+
<vuln vid="bddadaa4-9227-11eb-99c5-e09467587c17">
<topic>chromium -- multiple vulnerabilities</topic>
<affects>
More information about the dev-commits-ports-all
mailing list