You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
mend-bolt-for-githubbot
changed the title
CVE-2017-18258 (Low) detected in nokogiri-1.5.11.gem
CVE-2017-18258 (Low) detected in nokogiri-1.5.11.gem - autoclosed
Mar 6, 2025
✔️ This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2017-18258 - Low Severity Vulnerability
Nokogiri (�) is an HTML, XML, SAX, and Reader parser. Among Nokogiri's many features is the ability to search documents via XPath or CSS3 selectors.
XML is like violence - if it doesn�t solve your problems, you are not using
enough of it.
Library home page: https://rubygems.org/gems/nokogiri-1.5.11.gem
Path to dependency file: /vagrant/chef/cookbooks/apt/Gemfile.lock
Path to vulnerable library: /tmp/containerbase/cache/.ruby/cache/nokogiri-1.5.11.gem,/tmp/containerbase/cache/.ruby/cache/nokogiri-1.5.11.gem
Dependency Hierarchy:
Found in HEAD commit: 4d4d8b25d41ea632109b5a3585587d2bf861b5d6
Found in base branch: master
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
Publish Date: 2018-04-08
URL: CVE-2017-18258
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-882p-jqgm-f45g
Release Date: 2018-04-08
Fix Resolution: nokogiri - 1.8.2
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: