vulnerability
Ubuntu: USN-7659-1 (CVE-2022-29181): Nokogiri vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:N/A:P) | May 20, 2022 | Jun 26, 2025 | Aug 18, 2025 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:P)
Published
May 20, 2022
Added
Jun 26, 2025
Modified
Aug 18, 2025
Description
Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a `String` by calling `#to_s` or equivalent.
Solution
ubuntu-pro-upgrade-ruby-nokogiri
References
- CVE-2022-29181
- https://attackerkb.com/topics/CVE-2022-29181
- CWE-241
- CWE-843
- UBUNTU-USN-7659-1
- URL-https://github.com/sparklemotion/nokogiri/commit/83cc451c3f29df397caa890afc3b714eae6ab8f7
- URL-https://github.com/sparklemotion/nokogiri/commit/db05ba9a1bd4b90aa6c76742cf6102a7c7297267
- URL-https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.6
- URL-https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m
- URL-https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri/
- URL-https://www.cve.org/CVERecord?id=CVE-2022-29181
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.