vulnerability
Rocky Linux: CVE-2023-36617: ruby (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Jun 29, 2023 | Mar 28, 2024 | Oct 6, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jun 29, 2023
Added
Mar 28, 2024
Modified
Oct 6, 2025
Description
A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb. NOTE: this issue exists becuse of an incomplete fix for CVE-2023-28755. Version 0.10.3 is also a fixed version.
Solutions
rocky-upgrade-rubyrocky-upgrade-ruby-bundled-gemsrocky-upgrade-ruby-bundled-gems-debuginforocky-upgrade-ruby-debuginforocky-upgrade-ruby-debugsourcerocky-upgrade-ruby-develrocky-upgrade-ruby-libsrocky-upgrade-ruby-libs-debuginforocky-upgrade-rubygem-bigdecimalrocky-upgrade-rubygem-bigdecimal-debuginforocky-upgrade-rubygem-bsonrocky-upgrade-rubygem-bson-debuginforocky-upgrade-rubygem-bson-debugsourcerocky-upgrade-rubygem-io-consolerocky-upgrade-rubygem-io-console-debuginforocky-upgrade-rubygem-jsonrocky-upgrade-rubygem-json-debuginforocky-upgrade-rubygem-mysql2rocky-upgrade-rubygem-mysql2-debuginforocky-upgrade-rubygem-mysql2-debugsourcerocky-upgrade-rubygem-opensslrocky-upgrade-rubygem-openssl-debuginforocky-upgrade-rubygem-pgrocky-upgrade-rubygem-pg-debuginforocky-upgrade-rubygem-pg-debugsourcerocky-upgrade-rubygem-psychrocky-upgrade-rubygem-psych-debuginforocky-upgrade-rubygem-rbsrocky-upgrade-rubygem-rbs-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.