Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. nokogiri
  4. ›
  5. GMS-2022-1438

GMS-2022-1438: Integer Overflow or Wraparound in libxml2 affects Nokogiri

May 18, 2022

Summary

Nokogiri v1.13.5 upgrades the packaged version of its dependency libxml2 from v2.9.13 to v2.9.14.

libxml2 v2.9.14 addresses CVE-2022-29824. This version also includes several security-related bug fixes for which CVEs were not created, including a potential double-free, potential memory leaks, and integer-overflow.

Please note that this advisory only applies to the CRuby implementation of Nokogiri < 1.13.5, and only if the packaged libraries are being used. If you’ve overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro’s libxml2 and libxslt release announcements.

Mitigation

Upgrade to Nokogiri >= 1.13.5.

Users who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link Nokogiri against external libraries libxml2 >= 2.9.14 which will also address these same issues.

Impact

libxml2 <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-29824" target="_blank" rel="nofollow">CVE-2022-29824</a>

  • CVSS3 score:
  • Unspecified upstream
  • Nokogiri maintainers evaluate at 8.6 (High) ([.
  • Type: Denial of service, information disclosure
  • Description: In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don’t check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2’s buffer functions, for example libxslt through 1.1.35, is affected as well.
  • Fixed: https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a24

All versions of libml2 prior to v2.9.14 are affected.

Applications parsing or serializing multi-gigabyte documents (in excess of INT_MAX bytes) may be vulnerable to an integer overflow bug in buffer handling that could lead to exposure of confidential data, modification of unrelated data, or a segmentation fault resulting in a denial-of-service.

References

  • libxml2 v2.9.14 release notes
  • CVE-2022-29824
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer

References

  • github.com/advisories/GHSA-cgx6-hpwq-fhv5
  • github.com/sparklemotion/nokogiri/security/advisories/GHSA-cgx6-hpwq-fhv5
  • gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14
  • nvd.nist.gov/vuln/detail/CVE-2022-29824

Code Behaviors & Features

Detect and mitigate GMS-2022-1438 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.13.5

Fixed versions

  • 1.13.5

Solution

Upgrade to version 1.13.5 or above.

Source file

gem/nokogiri/GMS-2022-1438.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:30 +0000.