<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2021-32740</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2021-32740</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>12</Number>
        <Date>2025-02-17T00:37:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-07-13T10:31:11Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-02-17T00:37:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2021-32740</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-September/009394.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:2927-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-September/009392.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:2928-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud Crowbar 8">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud Crowbar 8">
        <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8" CPE="cpe:/o:suse:suse-openstack-cloud-crowbar:8">SUSE OpenStack Cloud Crowbar 8</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud Crowbar 9">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud Crowbar 9">
        <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9" CPE="cpe:/o:suse:suse-openstack-cloud-crowbar:9">SUSE OpenStack Cloud Crowbar 9</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-rubygem-addressable-2.3.6-3.3.3">
      <FullProductName ProductID="ruby2.1-rubygem-addressable-2.3.6-3.3.3">ruby2.1-rubygem-addressable-2.3.6-3.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-rubygem-addressable-2.3.6-4.3.3">
      <FullProductName ProductID="ruby2.1-rubygem-addressable-2.3.6-4.3.3">ruby2.1-rubygem-addressable-2.3.6-4.3.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.7-rubygem-http-5.0.4-1.1">
      <FullProductName ProductID="ruby2.7-rubygem-http-5.0.4-1.1">ruby2.7-rubygem-http-5.0.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby3.0-rubygem-http-5.0.4-1.1">
      <FullProductName ProductID="ruby3.0-rubygem-http-5.0.4-1.1">ruby3.0-rubygem-http-5.0.4-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby3.1-rubygem-http-5.1.0-1.1">
      <FullProductName ProductID="ruby3.1-rubygem-http-5.1.0-1.1">ruby3.1-rubygem-http-5.1.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby3.2-rubygem-http-5.1.0-1.4">
      <FullProductName ProductID="ruby3.2-rubygem-http-5.1.0-1.4">ruby3.2-rubygem-http-5.1.0-1.4</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.1-rubygem-addressable-2.3.6-3.3.3" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 8">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 8:ruby2.1-rubygem-addressable-2.3.6-3.3.3">ruby2.1-rubygem-addressable-2.3.6-3.3.3 as a component of SUSE OpenStack Cloud Crowbar 8</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-rubygem-addressable-2.3.6-4.3.3" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud Crowbar 9">
      <FullProductName ProductID="SUSE OpenStack Cloud Crowbar 9:ruby2.1-rubygem-addressable-2.3.6-4.3.3">ruby2.1-rubygem-addressable-2.3.6-4.3.3 as a component of SUSE OpenStack Cloud Crowbar 9</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.7-rubygem-http-5.0.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.7-rubygem-http-5.0.4-1.1">ruby2.7-rubygem-http-5.0.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby3.0-rubygem-http-5.0.4-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby3.0-rubygem-http-5.0.4-1.1">ruby3.0-rubygem-http-5.0.4-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby3.1-rubygem-http-5.1.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby3.1-rubygem-http-5.1.0-1.1">ruby3.1-rubygem-http-5.1.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby3.2-rubygem-http-5.1.0-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby3.2-rubygem-http-5.1.0-1.4">ruby3.2-rubygem-http-5.1.0-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.</Note>
    </Notes>
    <CVE>CVE-2021-32740</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE OpenStack Cloud Crowbar 8:ruby2.1-rubygem-addressable-2.3.6-3.3.3</ProductID>
        <ProductID>SUSE OpenStack Cloud Crowbar 9:ruby2.1-rubygem-addressable-2.3.6-4.3.3</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.7-rubygem-http-5.0.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.0-rubygem-http-5.0.4-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.1-rubygem-http-5.1.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby3.2-rubygem-http-5.1.0-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:N/I:N/A:P</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>7.5</BaseScoreV3>
        <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
