Source: ruby-nokogiri
Version: 1.18.2+dfsg-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/sparklemotion/nokogiri/issues/3500
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for ruby-nokogiri.

CVE-2025-6490[0]:
| A vulnerability was found in sparklemotion nokogiri up to 1.18.7 and
| classified as problematic. This issue affects the function
| hashmap_set_with_hash of the file gumbo-parser/src/hashmap.c. The
| manipulation leads to heap-based buffer overflow. An attack has to
| be approached locally. The exploit has been disclosed to the public
| and may be used.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-6490
    https://www.cve.org/CVERecord?id=CVE-2025-6490
[1] https://github.com/sparklemotion/nokogiri/issues/3500

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

_______________________________________________
Pkg-ruby-extras-maintainers mailing list
Pkg-ruby-extras-maintainers@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-ruby-extras-maintainers

Reply via email to