Vulnerability CVE-2023-22796: Information

Description

A regular expression based DoS vulnerability in Active Support <6.1.7.1 and <7.0.4.1. A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

Severity: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Published: Feb. 9, 2023
Modified: Feb. 2, 2024
Error type identifier: CWE-1333

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
gem-railssisyphus6.1.7.1-alt16.1.7.7-alt1ALT-PU-2023-1336-1313736Fixed
gem-railssisyphus_riscv646.1.7.1-alt1.16.1.7.1-alt1.2ALT-PU-2023-2733-1-Fixed
gem-railsp106.1.7.1-alt1.16.1.7.1-alt1.2ALT-PU-2023-4268-4307833Fixed
gem-railsc10f16.1.7.1-alt1.25.2.4.4-alt2ALT-PU-2024-7814-2334397Testing
gem-railsp116.1.7.1-alt16.1.7.7-alt1ALT-PU-2023-1336-1313736Fixed

References to Advisories, Solutions, and Tools

    1. Configuration 1

      cpe:2.3:a:activesupport_project:activesupport:*:*:*:*:*:ruby:*:*
      Start including
      7.0.0
      End excliding
      7.0.4.1

      cpe:2.3:a:activesupport_project:activesupport:*:*:*:*:*:ruby:*:*
      End excliding
      6.1.7.1