CVE-2022-23514

NameCVE-2022-23514
DescriptionLoofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
Debian Bugs1026083

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-loofah (PTS)buster, buster (security)2.2.3-1+deb10u1vulnerable
bullseye2.7.0+dfsg-1vulnerable
bookworm, sid2.19.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-loofahsource(unstable)2.19.1-11026083

Notes

[buster] - ruby-loofah <no-dsa> (Minor issue)
https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh
https://github.com/flavorjones/loofah/commit/a6e0a1ab90675a17b1b2be189129d94139e4b143

Search for package or bug name: Reporting problems