Name | CVE-2022-28366 |
Description | Certain Neko-related HTML parsers allow a denial of service via crafted Processing Instruction (PI) input that causes excessive heap memory consumption. In particular, this issue exists in HtmlUnit-Neko through 2.26, and is fixed in 2.27. This issue also exists in CyberNeko HTML through 1.9.22 (also affecting OWASP AntiSamy before 1.6.6), but 1.9.22 is the last version of CyberNeko HTML. NOTE: this may be related to CVE-2022-24839. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1010154 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libowasp-antisamy-java (PTS) | jessie, buster, stretch | 1.5.3+dfsg-1 | vulnerable |
| bullseye, bookworm | 1.5.3+dfsg-1.1 | vulnerable |
| sid, trixie | 1.7.4-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - libowasp-antisamy-java <ignored> (Minor issue)
[bullseye] - libowasp-antisamy-java <no-dsa> (Minor issue)
[buster] - libowasp-antisamy-java <no-dsa> (Minor issue)
[stretch] - libowasp-antisamy-java <no-dsa> (Minor issue)
https://github.com/nahsra/antisamy/releases/tag/v1.6.6
https://github.com/nahsra/antisamy/issues/174