A command injection vulnerability in Nokogiri v1.10.3 and earlier allows
commands to be executed in a subprocess via Ruby's `` method.
Processes are vulnerable only if the undocumented method
`Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input
as the filename. This vulnerability appears in code generated by the
Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to
generate lexical scanner code for parsing CSS queries. The underlying
vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this
version of Rexical in Nokogiri v1.10.4.
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):released (
Ubuntu 18.04 LTS (Bionic Beaver):released (1.8.2-1ubuntu0.1)
Ubuntu 19.04 (Disco Dingo):released (1.10.0+dfsg1-2ubuntu0.1)
Ubuntu 19.10 (Eoan Ermine):released (1.10.3+dfsg1-2ubuntu0.1)
Ubuntu 20.04 (Focal Fossa):not-affected (1.10.4+dfsg1-1)
More Information

Updated: 2019-11-05 15:14:20 UTC (commit d8b768a6cc557072ad0c1aa200b2ab383d2ba15c)