Name | CVE-2022-23476 |
Description | Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ruby-nokogiri (PTS) | jessie, jessie (lts) | 1.6.3.1+ds-1+deb8u3 | vulnerable |
| stretch (security), stretch (lts), stretch | 1.6.8.1-1+deb9u2 | fixed |
| buster (security), buster, buster (lts) | 1.10.0+dfsg1-2+deb10u1 | fixed |
| bullseye | 1.11.1+dfsg-2 | fixed |
| bullseye (security) | 1.11.1+dfsg-2+deb11u1 | fixed |
| bookworm | 1.13.10+dfsg-2 | fixed |
| sid, trixie | 1.16.4+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bullseye] - ruby-nokogiri <not-affected> (Introduced in 1.13.8)
[buster] - ruby-nokogiri <not-affected> (Introduced in 1.13.8)
https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-qv4q-mr5r-qprj
https://github.com/sparklemotion/nokogiri/commit/9fe0761c47c0d4270d1a5220cfd25de080350d50 (v1.13.10)
[stretch] - ruby-nokogiri <not-affected> (Introduced in 1.13.8)