CVE-2023-36617

NameCVE-2023-36617
DescriptionA ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3858-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
jruby (PTS)bookworm9.3.9.0+ds-8fixed
sid, trixie9.4.8.0+ds-1fixed
ruby2.7 (PTS)bullseye2.7.4-1+deb11u1vulnerable
bullseye (security)2.7.4-1+deb11u2fixed
ruby3.1 (PTS)bookworm, bookworm (security)3.1.2-7+deb12u1fixed
sid, trixie3.1.2-8.4fixed
rubygems (PTS)bullseye3.2.5-2fixed
bookworm3.3.15-2fixed
sid, trixie3.4.20-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
jrubysource(unstable)(not affected)
ruby2.5source(unstable)(unfixed)
ruby2.7sourcebullseye2.7.4-1+deb11u2DLA-3858-1
ruby2.7source(unstable)(not affected)
ruby3.1source(unstable)(not affected)
rubygemssource(unstable)(not affected)

Notes

- rubygems <not-affected> (Incomplete fix never applied)
- ruby3.1 <not-affected> (Incomplete fix never applied)
- ruby2.7 <not-affected> (Incomplete fix never applied)
[buster] - ruby2.5 <postponed> (Minor issue, ReDoS)
- jruby <not-affected> (Incomplete fix not applied, covered by CVE-2023-28755)
[buster] - jruby <postponed> (Minor issue, ReDoS)
https://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/
https://github.com/ruby/uri/commit/9010ee2536adda10a0555ae1ed6fe2f5808e6bf1
https://github.com/ruby/uri/commit/9d7bcef1e6ad23c9c6e4932f297fb737888144c8

Search for package or bug name: Reporting problems