Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Investigate libxml2 patches in USN-5548-1 #2619

Closed
flavorjones opened this issue Aug 8, 2022 · 1 comment
Closed

Investigate libxml2 patches in USN-5548-1 #2619

flavorjones opened this issue Aug 8, 2022 · 1 comment

Comments

@flavorjones
Copy link
Member

flavorjones commented Aug 8, 2022

This issue is to track an investigation into the upstream patches applied by Canonical to the 2.9.10-derived version

References:

Summary of Analysis

This vulnerability was identified and addressed years ago in Nokogiri and in the downstream Loofah, Sanitize, and rails-html-sanitizer gems. No action necessary.


History of this issue

  • 2022-08-07 Issue created after USN was issued and the Nokogiri maintainer came back from vacation
  • 2022-08-07 Analysis complete, no action necessary, issue updated and closed.
@flavorjones
Copy link
Member Author

Analysis

The CVE in question was fixed by GNOME/libxml2@c1ba6f5 in libxml 2.9.11. This version of libxml2 has been present since Nokogiri v1.11.4 released on 2021-05-14.

Note further, though, that this vulnerability was named in:

and so the above patch was applied very early to Nokogiri's packaged libxml2 source, via commit 3872182, present in Nokogiri v1.8.3 released on 2018-06-16. Details can be found in #1746 or in the above linked reports.

Summary

This vulnerability was identified and addressed years ago in Nokogiri and in the downstream Loofah, Sanitize, and rails-html-sanitizer gems. No action necessary.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant