Bug 2184059 (CVE-2023-28755) - CVE-2023-28755 ruby: ReDoS vulnerability in URI
Summary: CVE-2023-28755 ruby: ReDoS vulnerability in URI
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2023-28755
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2186603 2186604 2187490 2187491 2187492 2187493 2187494 2187495 2187496 2187497 2187498 2187499 2189467
Blocks: 2184057
TreeView+ depends on / blocked
 
Reported: 2023-04-03 14:33 UTC by Marco Benatto
Modified: 2024-04-01 01:16 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the rubygem URI. The URI parser mishandles invalid URLs that have specific characters, which causes an increase in execution time parsing strings to URI objects. This may result in a regular expression denial of service (ReDoS).
Clone Of:
Environment:
Last Closed: 2023-06-27 19:32:43 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:3291 0 None None None 2023-05-24 08:55:57 UTC
Red Hat Product Errata RHSA-2023:3821 0 None None None 2023-06-27 14:57:54 UTC
Red Hat Product Errata RHSA-2023:7025 0 None None None 2023-11-14 15:18:47 UTC
Red Hat Product Errata RHSA-2024:1431 0 None None None 2024-03-19 18:37:49 UTC
Red Hat Product Errata RHSA-2024:1576 0 None None None 2024-04-01 01:16:40 UTC

Description Marco Benatto 2023-04-03 14:33:16 UTC
A ReDoS issue was discovered in the URI component. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects.

The uri gem version 0.12.0, 0.11.0, 0.10.1, 0.10.0 and all versions prior 0.10.0 are vulnerable for this vulnerability.

Comment 1 Marian Rehak 2023-04-13 19:26:24 UTC
Created ruby tracking bugs for this issue:

Affects: fedora-all [bug 2186603]


Created ruby:3.0/ruby tracking bugs for this issue:

Affects: fedora-all [bug 2186604]

Comment 2 Product Security DevOps Team 2023-04-14 00:06:17 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-28755

Comment 4 errata-xmlrpc 2023-05-24 08:55:55 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 7

Via RHSA-2023:3291 https://access.redhat.com/errata/RHSA-2023:3291

Comment 5 errata-xmlrpc 2023-06-27 14:57:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:3821 https://access.redhat.com/errata/RHSA-2023:3821

Comment 6 Product Security DevOps Team 2023-06-27 19:32:41 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-28755

Comment 7 errata-xmlrpc 2023-11-14 15:18:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7025 https://access.redhat.com/errata/RHSA-2023:7025

Comment 8 errata-xmlrpc 2024-03-19 18:37:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:1431 https://access.redhat.com/errata/RHSA-2024:1431

Comment 9 errata-xmlrpc 2024-04-01 01:16:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:1576 https://access.redhat.com/errata/RHSA-2024:1576


Note You need to log in before you can comment on or make changes to this bug.