Fedora Linux 8568 Published by

A rubygem-nokogiri security update has been released for Fedora 36.



SECURITY: Fedora 36 Update: rubygem-nokogiri-1.13.4-1.fc36


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-d231cb5e1f
2022-05-07 04:08:14.314541
--------------------------------------------------------------------------------

Name : rubygem-nokogiri
Product : Fedora 36
Version : 1.13.4
Release : 1.fc36
URL :   https://nokogiri.org
Summary : An HTML, XML, SAX, and Reader parser
Description :
Nokogiri parses and searches XML/HTML very quickly, and also has
correctly implemented CSS3 selector support as well as XPath support.

Nokogiri also features an Hpricot compatibility layer to help ease the change
to using correct CSS and XPath.

--------------------------------------------------------------------------------
Update Information:

New version 1.13.4 is released. This new version addresses possible DOS by
regex, assigned as CVE-2022-24836.
--------------------------------------------------------------------------------
ChangeLog:

* Thu Apr 14 2022 Mamoru TASAKA - 1.13.4-1
- 1.13.4
- Addresses CVE-2022-24836
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2074348 - CVE-2022-24836 rubygem-nokogiri: nokogiri: ReDoS in HTML encoding detection [fedora-all]
  https://bugzilla.redhat.com/show_bug.cgi?id=2074348
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-d231cb5e1f' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________