CVE-2022-23476: Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected. Please stabilize 1.13.10.
Please cleanup.
commit 174a6378aae468e3127984fc2a99a06116d8a55a Author: Hans de Graaff <graaff@gentoo.org> Date: Tue Jan 31 08:19:47 2023 +0100 dev-ruby/nokogiri: drop 1.13.6
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=acc7fec53d067c43c33e830e51592868bdeb80a5 commit acc7fec53d067c43c33e830e51592868bdeb80a5 Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2024-08-07 13:11:12 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2024-08-07 13:11:23 +0000 [ GLSA 202408-13 ] Nokogiri: Denial of Service Bug: https://bugs.gentoo.org/884863 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org> glsa-202408-13.xml | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+)