[Bug 1207454] New: VUL-0: CVE-2023-22796: rubygem-activesupport-*: Possible ReDoS based DoS vulnerability in Active Support's underscore
https://bugzilla.suse.com/show_bug.cgi?id=1207454 Bug ID: 1207454 Summary: VUL-0: CVE-2023-22796: rubygem-activesupport-*: Possible ReDoS based DoS vulnerability in Active Support's underscore Classification: openSUSE Product: openSUSE Tumbleweed Version: Current Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: mschnitzer@suse.com Reporter: rfrohl@suse.com QA Contact: security-team@suse.de Found By: --- Blocker: --- Created attachment 864351 --> https://bugzilla.suse.com/attachment.cgi?id=864351&action=edit 7.0 patch There is a possible regular expression based DoS vulnerability in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-22796. Versions Affected: All Not affected: None Fixed Versions: 6.1.7.1, 7.0.4.1 Impact A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability. This affects String#underscore, ActiveSupport::Inflector.underscore, String#titleize, and any other methods using these. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases The FIXED releases are available at the normal locations. Workarounds There are no feasible workarounds for this issue. Users on Ruby 3.2.0 or greater may be able to reduce the impact by configuring Regexp.timeout. Patches To aid users who aren���t able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. 6-1-Avoid-regex-backtracking-in-Inflector.underscore.patch - Patch for 6.1 series 7-0-Avoid-regex-backtracking-in-Inflector.underscore.patch - Patch for 7.0 series Please note that only the 7.0.Z and 6.1.Z series are supported at present, and 6.0.Z for severe vulnerabilities. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Credits We would like to thank ooooooo_q for reporting this https://discuss.rubyonrails.org/t/cve-2023-22796-possible-redos-based-dos-vu... -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207454 https://bugzilla.suse.com/show_bug.cgi?id=1207454#c1 --- Comment #1 from Robert Frohl <rfrohl@suse.com> --- Created attachment 864352 --> https://bugzilla.suse.com/attachment.cgi?id=864352&action=edit 6.1 patch -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207454 Maintenance Automation <maint-coord+maintenance-robot@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P3 - Medium -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207454 Robert Frohl <rfrohl@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- URL| |https://smash.suse.de/issue | |/354928/ -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207454 https://bugzilla.suse.com/show_bug.cgi?id=1207454#c2 Robert Frohl <rfrohl@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|mschnitzer@suse.com |coldpool@suse.de --- Comment #2 from Robert Frohl <rfrohl@suse.com> --- tracking as affected: - SUSE:SLE-15:Update/rubygem-activesupport-5_1 - SUSE:SLE-12:Update/rubygem-activesupport-4_2 and - openSUSE:Factory/rubygem-activesupport-7.0 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207454 SMASH SMASH <smash_bz@suse.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Whiteboard| |CVSSv3.1:SUSE:CVE-2023-2279 | |6:5.9:(AV:N/AC:H/PR:N/UI:N/ | |S:U/C:N/I:N/A:H) -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207454 Valentin Lefebvre <valentin.lefebvre@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |valentin.lefebvre@suse.com -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207454 https://bugzilla.suse.com/show_bug.cgi?id=1207454#c7 Valentin Lefebvre <valentin.lefebvre@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Assignee|coldpool@suse.de |security-team@suse.de --- Comment #7 from Valentin Lefebvre <valentin.lefebvre@suse.com> --- Packages submitted: SLE-12/rubygem-activesupport-4_2, SLE-15/rubygem-activesupport-5_1. Update submitted to the devel package that fixed the CVE: https://build.opensuse.org/request/show/1061553 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207454 https://bugzilla.suse.com/show_bug.cgi?id=1207454#c8 --- Comment #8 from Swamp Workflow Management <swamp@suse.de> --- SUSE-SU-2023:0275-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 1207454 CVE References: CVE-2023-22796 JIRA References: Sources used: openSUSE Leap 15.4 (src): rubygem-activesupport-5_1-5.1.4-150000.3.12.1 SUSE Linux Enterprise High Availability 15-SP4 (src): rubygem-activesupport-5_1-5.1.4-150000.3.12.1 SUSE Linux Enterprise High Availability 15-SP3 (src): rubygem-activesupport-5_1-5.1.4-150000.3.12.1 SUSE Linux Enterprise High Availability 15-SP2 (src): rubygem-activesupport-5_1-5.1.4-150000.3.12.1 SUSE Linux Enterprise High Availability 15-SP1 (src): rubygem-activesupport-5_1-5.1.4-150000.3.12.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1207454 https://bugzilla.suse.com/show_bug.cgi?id=1207454#c9 --- Comment #9 from Maintenance Automation <maint-coord+maintenance-robot@suse.de> --- SUSE-SU-2023:0612-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1207454 CVE References: CVE-2023-22796 Sources used: SUSE OpenStack Cloud Crowbar 8 (src): rubygem-activesupport-4_2-4.2.9-7.15.1 SUSE OpenStack Cloud Crowbar 9 (src): rubygem-activesupport-4_2-4.2.9-7.15.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com