Bugzilla – Bug 1188207
VUL-0: CVE-2021-32740: rubygem-addressable: ReDoS in templates
Last modified: 2024-06-07 07:52:17 UTC
rh#1979702 Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking. Reference: https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g References: https://bugzilla.redhat.com/show_bug.cgi?id=1979702 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32740 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32740 https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc
tracking as affected: - SUSE:SLE-12-SP2:Update:Products:Cloud7:Update/rubygem-addressable - SUSE:SLE-12-SP3:Update:Products:Cloud8:Update/rubygem-addressable - SUSE:SLE-12-SP4:Update:Products:Cloud9:Update/rubygem-addressable as well as openSUSE:Factory
@robert please note that SOC 7 is out of support, thus this version of SOC will not get the fix. Please have this in mind for further CVE's impacting SOC products.
(In reply to Robert Frohl from comment #1) > as well as openSUSE:Factory Factory already has 2.8.0 which is not vulnerable.
(In reply to Christian Almeida de Oliveira from comment #2) > @robert please note that SOC 7 is out of support, thus this version of SOC > will not get the fix. Please have this in mind for further CVE's impacting > SOC products. I updated our tracking. Flagging SOC7 as EOL is in the works, but has not been completed.
This commit looks like the actual fix from upstream: https://github.com/sporkmonger/addressable/commit/b48ff03347a6d46e8dc674e242ce74c6381962a5
# maintenance_jira_update_notice SUSE-SU-2021:2928-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1188207 CVE References: CVE-2021-32740 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 8 (src): rubygem-addressable-2.3.6-3.3.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
# maintenance_jira_update_notice SUSE-SU-2021:2927-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1188207 CVE References: CVE-2021-32740 JIRA References: Sources used: SUSE OpenStack Cloud Crowbar 9 (src): rubygem-addressable-2.3.6-4.3.3 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Fixes for SOC 8 and SOC 9 are available. Back to Security team.