Bug 2088684 (CVE-2022-29181)

Summary: CVE-2022-29181 rubygem-nokogiri: Improper Handling of Unexpected Data Type in Nokogiri
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: akarol, bbuckingham, bcourt, dmetzger, ehelms, gmccullo, gtanzill, jfrey, jhardy, jsherril, lzap, mhulan, mtasaka, nmoumoul, obarenbo, orabin, pcreech, pvalena, rchan, roliveri, ruby-maint, simaishi, smallamp, tdawson, vanmeeuwen+fedora, vondruch
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: rubygem-nokogiri 1.13.6 Doc Type: ---
Doc Text:
A flaw was found in the rubygem-nokogiri package. This flaw allows malicious users to change partial contents or configurations on the system. Additionally, this vulnerability can also cause a limited denial of service in the form of interruptions in resource availability.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2088685, 2088686, 2089222, 2089223    
Bug Blocks: 2088687    

Description Avinash Hanwate 2022-05-20 05:19:05 UTC
Nokogiri < v1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers. For CRuby users, this may allow specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory.

https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m

Comment 1 Avinash Hanwate 2022-05-20 05:19:35 UTC
Created rubygem-nokogiri tracking bugs for this issue:

Affects: epel-all [bug 2088685]
Affects: fedora-all [bug 2088686]