Skip to content

CVE-2023-28755: language fix #3006

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Mar 28, 2023
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 11 additions & 7 deletions en/news/_posts/2023-03-28-redos-in-uri-cve-2023-28755.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,16 +13,20 @@ This vulnerability has been assigned the CVE identifier [CVE-2023-28755](https:/

## Details

A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects.
A ReDoS issue was discovered in the URI component. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects.

Please update the uri gem to version 0.12.1 or later. We also release for old uri gem with Ruby releases. Please use them if you need to only security fix.
Copy link
Member Author

@sorah sorah Mar 28, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The key part of this patch is to fix the following sentence where hard to understand:

We also release for old uri gem with Ruby releases. Please use them if you need to only security fix.

I need to ask the original author to confirm the intention.

The `uri` gem version 0.10.1, 0.10.2, 0.11.0, 0.12.0, and all versions 0.10.0 and prior are vulnerable for this vulnerability.

* For Ruby 2.7 users: URI 0.10.0.1
* For Ruby 3.0 users: URI 0.10.2
* For Ruby 3.1 users: URI 0.11.1
* For Ruby 3.2 users: URI 0.12.1
## Recommended action

You can use `gem update uri` to update it. If you are using bundler, please add `gem "uri", ">= 0.12.1"` to your `Gemfile`.
We recommend to update the `uri` gem to 0.12.1. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead:

* For Ruby 2.7: Update to `uri` 0.10.0.1
* For Ruby 3.0: Update to `uri` 0.10.2
* For Ruby 3.1: Update to `uri` 0.11.1
* For Ruby 3.2: Update to `uri` 0.12.1

You can use `gem update uri` to update it. If you are using bundler, please add `gem "uri", ">= 0.12.1"` (or other version mentioned above) to your `Gemfile`.

## Affected versions

Expand Down