OESA-2023-1112

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1112
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2023-1112.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2023-1112
Upstream
Published
2023-02-21T11:04:56Z
Modified
2025-08-12T05:18:20.091914Z
Summary
rubygem-globalid security update
Details

URIs for your models makes it easy to pass references around.

Security Fix(es):

A ReDoS based DoS vulnerability in the GlobalID <1.0.1 which could allow an attacker supplying a carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately.(CVE-2023-22799)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:22.03-LTS-SP1 / rubygem-globalid

Package

Name
rubygem-globalid
Purl
pkg:rpm/openEuler/rubygem-globalid&distro=openEuler-22.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.4.2-4.oe2203sp1

Ecosystem specific

{
    "noarch": [
        "rubygem-globalid-0.4.2-4.oe2203sp1.noarch.rpm",
        "rubygem-globalid-doc-0.4.2-4.oe2203sp1.noarch.rpm"
    ],
    "src": [
        "rubygem-globalid-0.4.2-4.oe2203sp1.src.rpm"
    ]
}