Denial of Service Vulnerability in ActiveRecord's PostgreSQL adapter
High severity
GitHub Reviewed
Published
Jan 18, 2023
to the GitHub Advisory Database
•
Updated Aug 18, 2023
Package
Affected versions
>= 7.0.0, < 7.0.4.1
< 6.1.7.1
Patched versions
7.0.4.1
6.1.7.1
Description
Published to the GitHub Advisory Database
Jan 18, 2023
Reviewed
Jan 18, 2023
Published by the National Vulnerability Database
Feb 9, 2023
Last updated
Aug 18, 2023
There is a potential denial of service vulnerability present in ActiveRecord’s PostgreSQL adapter.
This has been assigned the CVE identifier CVE-2022-44566.
Versions Affected: All. Not affected: None. Fixed Versions: 5.2.8.15 (Rails LTS, which is a paid service and not part of the rubygem), 6.1.7.1, 7.0.4.1
Impact:
In ActiveRecord <7.0.4.1 and <6.1.7.1, when a value outside the range for a 64bit signed integer is provided to the PostgreSQL connection adapter, it will treat the target column type as numeric. Comparing integer values against numeric values can result in a slow sequential scan resulting in potential Denial of Service.
Releases
The fixed releases are available at the normal locations.
Workarounds
Ensure that user supplied input which is provided to ActiveRecord clauses do not contain integers wider than a signed 64bit representation or floats.
Patches
To aid users who aren’t able to upgrade immediately we have provided patches for the supported release series in accordance with our maintenance policy 1 regarding security issues. They are in git-am format and consist of a single changeset.
References