CVE-2022-23514

NameCVE-2022-23514
DescriptionLoofah is a general library for manipulating and transforming HTML/XML documents and fragments, built on top of Nokogiri. Loofah < 2.19.1 contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue is patched in version 2.19.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3565-1
Debian Bugs1026083

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
ruby-loofah (PTS)buster2.2.3-1+deb10u1vulnerable
buster (security)2.2.3-1+deb10u2fixed
bullseye2.7.0+dfsg-1vulnerable
bookworm2.19.1-1fixed
sid, trixie2.22.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby-loofahsourcebuster2.2.3-1+deb10u2DLA-3565-1
ruby-loofahsource(unstable)2.19.1-11026083

Notes

[bullseye] - ruby-loofah <no-dsa> (Minor issue)
https://github.com/flavorjones/loofah/security/advisories/GHSA-486f-hjj9-9vhh
https://github.com/flavorjones/loofah/commit/a6e0a1ab90675a17b1b2be189129d94139e4b143

Search for package or bug name: Reporting problems