Skip to content

Commit 320fa19

Browse files
committed
Add CVE-2018-14404 and CVE-2018-14567 for nokogiri
1 parent 27048ea commit 320fa19

1 file changed

Lines changed: 69 additions & 0 deletions

File tree

gems/nokogiri/CVE-2018-14404.yml

Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
---
2+
gem: nokogiri
3+
cve: 2018-14404
4+
date: 2018-10-04
5+
url: https://github.com/sparklemotion/nokogiri/issues/1785
6+
title: Nokogiri gem, via libxml2, is affected by multiple vulnerabilities
7+
description: |
8+
Nokogiri 1.8.5 has been released.
9+
10+
This is a security and bugfix release. It addresses two CVEs in upstream
11+
libxml2 rated as "medium" by Red Hat, for which details are below.
12+
13+
If you're using your distro's system libraries, rather than Nokogiri's
14+
vendored libraries, there's no security need to upgrade at this time,
15+
though you may want to check with your distro whether they've patched this
16+
(Canonical has patched Ubuntu packages). Note that these patches are not
17+
yet (as of 2018-10-04) in an upstream release of libxml2.
18+
19+
Full details about the security update are available in Github Issue #1785.
20+
[#1785]: https://github.com/sparklemotion/nokogiri/issues/1785
21+
22+
-----
23+
24+
[MRI] Pulled in upstream patches from libxml2 that address CVE-2018-14404
25+
and CVE-2018-14567. Full details are available in #1785. Note that these
26+
patches are not yet (as of 2018-10-04) in an upstream release of libxml2.
27+
28+
-----
29+
30+
CVE-2018-14404
31+
32+
Permalink:
33+
34+
https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14404.html
35+
36+
Description:
37+
38+
A NULL pointer dereference vulnerability exists in the
39+
xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when
40+
parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR
41+
case. Applications processing untrusted XSL format inputs with the use of
42+
the libxml2 library may be vulnerable to a denial of service attack due
43+
to a crash of the application
44+
45+
Canonical rates this vulnerability as "Priority: Medium"
46+
47+
-----
48+
49+
CVE-2018-14567
50+
51+
Permalink:
52+
53+
https://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-14567.html
54+
55+
Description:
56+
57+
infinite loop in LZMA decompression
58+
59+
Canonical rates this vulnerability as "Priority: Medium"
60+
61+
patched_versions:
62+
- ">= 1.8.5"
63+
related:
64+
cve:
65+
- 2018-14567
66+
url:
67+
- https://groups.google.com/forum/#!msg/ruby-security-ann/uVrmO2HjqQw/Fw3ocLI0BQAJ
68+
- https://gitlab.gnome.org/GNOME/libxml2/commit/a436374994c47b12d5de1b8b1d191a098fa23594
69+
- https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74

0 commit comments

Comments
 (0)