Opened 7 months ago

Closed 7 months ago

#20317 closed enhancement (fixed)

ruby-3.3.5

Reported by: Bruce Dubbs Owned by: Douglas R. Reno
Priority: elevated Milestone: 12.3
Component: BOOK Version: git
Severity: normal Keywords:
Cc:

Description

New point version.

Change History (3)

comment:1 by Douglas R. Reno, 7 months ago

Owner: changed from blfs-book to Douglas R. Reno
Priority: normalelevated
Status: newassigned

The changes for the REXML vulnerabilities were finally backported to 3.3.x - it appears that the update to that gem was missed for 3.2/3.3, but was done for 3.0/3.1.

comment:2 by Douglas R. Reno, 7 months ago

Release notes:

What's Changed

    retry on cancelling of getaddrinfo by ko1 · Pull Request #11131
    Bug #20633: compile error at vm_insnhelper.c when HAVE_DECL_ATOMIC_SIGNAL_FENCE is 0
    Bug #20641: lib/bundled_gems.rb makes Kernel.require over 100x slower
    Bug #20650: Memory leak in Regexp capture group when timeout
    Bug #20088: Ruby 3.3.0 does not cross-complie on arm64-darwin
    Bug #20653: Memory leak in String#start_with? when regexp times out
    Bug #20654: Floor and ceil have unexpected behaviour when ndigits is large
    Update RubyGems 3.5.16 and Bundler 2.5.16 for Ruby 3.3 by hsbt · Pull Request #11252
    Bug #20668: [3.3] shareable_constant_value: literal crash
    Backport warning feature for bundled gems from master by hsbt · Pull Request #11420
    Bug #20688: Use-after-free in WeakMap and WeakKeyMap
    Bug #20691: Use-after-free in WeakKeyMap#clear
    Merge URI-0.13.1 for Ruby 3.3 by hsbt · Pull Request #11466
    Bug #20667: Backport REXML CVE fixes
    Bug #20651: false && (1 in 1) produces argument stack underflow (-1)
    Bug #20649: Ripper fails to tokenize def f; (x)::A =
    Bug #20344: argument stack underflow (-1)
    Bug #20701: Hash argument passed as keyword splat can be mutated inside method

There are four security fixes here - CVE-2024-39908, CVE-2024-41123, CVE-2024-41946, and CVE-2024-43398.

CVE-2024-39908

CVE-2024-39908: DoS vulnerability in REXML

There is a DoS vulnerability in REXML gem. This vulnerability has been assigned the CVE 
identifier CVE-2024-39908. We strongly recommend upgrading the REXML gem.

Details

When it parses an XML that has many specific characters such as <, 0 and %>. REXML gem 
may take long time.

Please update REXML gem to version 3.3.2 or later.

Affected versions

    REXML gem 3.3.1 or prior

Credits

Thanks to mprogrammer for discovering this issue.

History

    Originally published at 2024-07-16 03:00:00 (UTC)

CVE-2024-41123

CVE-2024-41123: DoS vulnerabilities in REXML

There are some DoS vulnerabilities in REXML gem. These vulnerabilities have been 
assigned the CVE identifier CVE-2024-41123. We strongly recommend upgrading the REXML gem.

Details

When parsing an XML document that has many specific characters such as whitespace character, >] and ]>, REXML gem may take long time.

Please update REXML gem to version 3.3.3 or later.

Affected versions

    REXML gem 3.3.2 or prior

Credits

Thanks to mprogrammer and scyoon for discovering these issues.

History

    Originally published at 2024-08-01 03:00:00 (UTC)

CVE-2024-41946

CVE-2024-41946: DoS vulnerability in REXML

There is a DoS vulnerability in REXML gem. This vulnerability has been assigned the CVE 
identifier CVE-2024-41946. We strongly recommend upgrading the REXML gem.

Details

When parsing an XML that has many entity expansions with SAX2 or pull parser API, REXML 
gem may take long time.

Please update REXML gem to version 3.3.3 or later.

Affected versions

    REXML gem 3.3.2 or prior

Credits

Thanks to NAITOH Jun for discovering and fixing this issue.

History

    Originally published at 2024-08-01 03:00:00 (UTC)

CVE-2024-43398

CVE-2024-43398: DoS vulnerability in REXML

There is a DoS vulnerability in REXML gem. This vulnerability has been assigned the CVE 
identifier CVE-2024-43398. We strongly recommend upgrading the REXML gem.

Details

When parsing an XML that has many deep elements that have same local name attributes, 
REXML gem may take long time.

It’s only affected with the tree parser API. If you’re using REXML::Document.new to 
parse an XML, you may be affected.

Please update REXML gem to version 3.3.6 or later.

Affected versions

    REXML gem 3.3.5 or prior

Credits

Thanks to l33thaxor for discovering this issue.

History

    Originally published at 2024-08-22 03:00:00 (UTC)

comment:3 by Douglas R. Reno, 7 months ago

Resolution: fixed
Status: assignedclosed

Fixed at a63b21ef98005fd07fff599ab1adbca0d6327b8a

SA-12.2-003 issued

Note: See TracTickets for help on using tickets.