Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for this issue. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected. Reference: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h Upstream patch: https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d
Created rubygem-nokogiri tracking bugs for this issue: Affects: epel-7 [bug 2008916] Affects: fedora-all [bug 2008915]
Please look at the upstream info precisely. > JRuby users should upgrade to Nokogiri v1.12.5 > CRuby users are not affected.
services-sources notaffected
Haven't seen ManageIQ or Katello using JRuby. I do know theforeman project have some usage for Puppet client and server's Puppet module but JRuby not getting used in downstream. Thus, Red Hat CloudForms and Red Hat Satellite are not affected by this.