Fedora 36: rubygem-nokogiri 2022-acff3f54b2 | LinuxSecurity.com
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-acff3f54b2
2022-12-18 01:40:20.042356
--------------------------------------------------------------------------------

Name        : rubygem-nokogiri
Product     : Fedora 36
Version     : 1.13.10
Release     : 1.fc36
URL         : https://nokogiri.org
Summary     : An HTML, XML, SAX, and Reader parser
Description :
Nokogiri parses and searches XML/HTML very quickly, and also has
correctly implemented CSS3 selector support as well as XPath support.

Nokogiri also features an Hpricot compatibility layer to help ease the change
to using correct CSS and XPath.

--------------------------------------------------------------------------------
Update Information:

A potential bug was found on nokogiri on or before 1.13.9 overlooked some return
values from functions used internally. This can lead to raise some illegal
exception. This bug was assigned as CVE-2022-23476. This new rpm should fix this
issue.
--------------------------------------------------------------------------------
ChangeLog:

* Fri Dec  9 2022 Mamoru TASAKA  - 1.13.10-1
- 1.13.10
- Address CVE-2022-23476
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2152067 - CVE-2022-23476 rubygem-nokogiri: Unchecked return value from xmlTextReaderExpand [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=2152067
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-acff3f54b2' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue

Fedora 36: rubygem-nokogiri 2022-acff3f54b2

December 18, 2022
A potential bug was found on nokogiri on or before 1.13.9 overlooked some return values from functions used internally

Summary

Nokogiri parses and searches XML/HTML very quickly, and also has

correctly implemented CSS3 selector support as well as XPath support.

Nokogiri also features an Hpricot compatibility layer to help ease the change

to using correct CSS and XPath.

Update Information:

A potential bug was found on nokogiri on or before 1.13.9 overlooked some return values from functions used internally. This can lead to raise some illegal exception. This bug was assigned as CVE-2022-23476. This new rpm should fix this issue.

Change Log

* Fri Dec 9 2022 Mamoru TASAKA - 1.13.10-1 - 1.13.10 - Address CVE-2022-23476

References

[ 1 ] Bug #2152067 - CVE-2022-23476 rubygem-nokogiri: Unchecked return value from xmlTextReaderExpand [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2152067

Update Instructions

This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-acff3f54b2' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

Severity
Name : rubygem-nokogiri
Product : Fedora 36
Version : 1.13.10
Release : 1.fc36
URL : https://nokogiri.org
Summary : An HTML, XML, SAX, and Reader parser

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.