Skip to content

Commit ec75e98

Browse files
committed
[GR-19691] Update the Known CVEs document
PullRequest: truffleruby/4320
2 parents 0654e66 + 188f22b commit ec75e98

File tree

2 files changed

+6
-0
lines changed

2 files changed

+6
-0
lines changed

doc/user/known-cves.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ Cross-reference with the details on [the MRI website](https://www.ruby-lang.org/
1919

2020
Number | Description | Their Mitigation | Test | Our Mitigation
2121
--- | --- | --- | --- | ---
22+
CVE-2024-39908 | DoS in REXML | [Fix](https://github.com/ruby/rexml/compare/v3.3.1...v3.3.2) | [Test](https://github.com/ruby/rexml/compare/v3.3.1...v3.3.2) | [same mitigation as CRuby](https://www.ruby-lang.org/en/news/2024/07/16/dos-rexml-cve-2024-39908/), users must update rexml to 3.3.2+ if they use it
2223
CVE-2024-35176 | DoS in REXML | [Fix](https://github.com/ruby/rexml/pull/126/commits/ba70cfefadf7e79885fe08228d1df4c0549ad0f8) | [Test](https://github.com/ruby/rexml/pull/126/commits/ba70cfefadf7e79885fe08228d1df4c0549ad0f8) | [same mitigation as CRuby](https://www.ruby-lang.org/en/news/2024/05/16/dos-rexml-cve-2024-35176/), users must update rexml to 3.2.7+ if they use it
2324
CVE-2024-27282 | Arbitrary memory address read vulnerability with Regex search | [Fix](https://github.com/ruby/ruby/commit/989a2355808a63fc45367785c82ffd46d18c900a) | | Not applicable thanks to Java semantics
2425
CVE-2024-27281 | RCE vulnerability with .rdoc_options in RDoc | [Fix](https://github.com/ruby/rdoc/compare/v6.3.3...v6.3.4.1) | | Not applicable because TruffleRuby does not generate rdoc on gem install

test/truffle/gems/default-bundled-gems.sh

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,10 @@
11
#!/usr/bin/env bash
22

3+
# Generate a Gemfile.lock with all default and bundled gems. This way they are
4+
# automatically checked by GitHub for vulnerabilities that reminds us to update the
5+
# doc/user/known-cves.md document. Also it still seems valuable to check that
6+
# default + bundled gems are recognized by Bundler.
7+
38
source test/truffle/common.sh.inc
49

510
cd "$truffle/gems/default-bundled-gems" || exit 1

0 commit comments

Comments
 (0)