Skip to content

Commit

Permalink
[GR-19691] Add entry in Known CVEs document for ReDoS vulnerability i…
Browse files Browse the repository at this point in the history
…n REXML

PullRequest: truffleruby/4453
  • Loading branch information
andrykonchin committed Jan 16, 2025
2 parents f646119 + 2342c78 commit 88b3e12
Show file tree
Hide file tree
Showing 3 changed files with 10 additions and 117 deletions.
1 change: 1 addition & 0 deletions doc/user/known-cves.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ Cross-reference with the details on [the MRI website](https://www.ruby-lang.org/

Number | Description | Their Mitigation | Test | Our Mitigation
--- | --- | --- | --- | ---
CVE-2024-49761 | ReDoS vulnerability in REXML | [Fix](https://github.com/ruby/rexml/commit/ce59f2eb1aeb371fe1643414f06618dbe031979f) | [Test](https://github.com/ruby/rexml/commit/ce59f2eb1aeb371fe1643414f06618dbe031979f) | Not applicable thanks to TRegex
CVE-2024-39908 | DoS in REXML | [Fix](https://github.com/ruby/rexml/compare/v3.3.1...v3.3.2) | [Test](https://github.com/ruby/rexml/compare/v3.3.1...v3.3.2) | [same mitigation as CRuby](https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/), users must update rexml to 3.3.2+ if they use it
CVE-2024-35176 | DoS in REXML | [Fix](https://github.com/ruby/rexml/pull/126/commits/ba70cfefadf7e79885fe08228d1df4c0549ad0f8) | [Test](https://github.com/ruby/rexml/pull/126/commits/ba70cfefadf7e79885fe08228d1df4c0549ad0f8) | [same mitigation as CRuby](https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/), users must update rexml to 3.2.7+ if they use it
CVE-2024-27282 | Arbitrary memory address read vulnerability with Regex search | [Fix](https://github.com/ruby/ruby/commit/989a2355808a63fc45367785c82ffd46d18c900a) | | Not applicable thanks to Java semantics
Expand Down
117 changes: 0 additions & 117 deletions lib/gems/gems/rbs-3.4.0/Gemfile.lock

This file was deleted.

9 changes: 9 additions & 0 deletions spec/ruby/security/cve_2024_49761_spec.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
require_relative '../spec_helper'

ruby_version_is "3.2" do
describe "CVE-2024-49761 is resisted by" do
it "the Regexp implementation handling that regular expression in linear time" do
Regexp.linear_time?(/&#0*((?:\d+)|(?:x[a-fA-F0-9]+));/).should == true
end
end
end

0 comments on commit 88b3e12

Please sign in to comment.