Sha256: 5547fc46d8a8a5734b798f0a7cd877ba4ab99d76836734f16145c7f4fea91a2f

Contents?: true

Size: 1.13 KB

Versions: 6

Compression:

Stored size: 1.13 KB

Contents

---
gem: nokogiri
cve: 2015-7499
url: https://groups.google.com/forum/#!topic/ruby-security-ann/Dy7YiKb_pMM
title: |
  Nokogiri gem contains a heap-based buffer overflow vulnerability in libxml2
date: 2016-01-19

description: |
  Nokogiri version 1.6.7.2 has been released, pulling in several upstream
  patches to the vendored libxml2 to address the following CVE:

  CVE-2015-7499
  CVSS v2 Base Score: 5.0 (MEDIUM)

  Heap-based buffer overflow in the xmlGROW function in parser.c
  in libxml2 before 2.9.3 allows context-dependent attackers to
  obtain sensitive process memory information via unspecified
  vectors.

  libxml2 could be made to crash if it opened a specially crafted
  file. It was discovered that libxml2 incorrectly handled certain
  malformed documents. If a user or automated system were tricked
  into opening a specially crafted document, an attacker could
  possibly cause libxml2 to crash, resulting in a denial of service.

cvss_v2: 5.0

unaffected_versions:
  - "< 1.6.0"

patched_versions:
  - ">= 1.6.7.2"

related:
  url:
    - https://github.com/sparklemotion/nokogiri/commit/9eb540e7c905924a42757bf0a34c2c00707d536c

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml
bundler-budit-0.6.2 data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml
bundler-audit-0.6.1 data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml
bundler-audit-0.6.0 data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml
bundler-audit-0.5.0 data/ruby-advisory-db/gems/nokogiri/CVE-2015-7499.yml