CVE-2013-4363
Published: 17 October 2013
Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.
Notes
Author | Note |
---|---|
tyhicks | rubygems is for users of ruby1.8. ruby1.9.1 and jruby ship an embedded rubygems. |
jdstrand | per mdeslaur in CVE-2013-4287, we don't consider this to be a security issue |
Priority
Status
Package | Release | Status |
---|---|---|
jruby Launchpad, Ubuntu, Debian |
lucid |
Ignored
|
precise |
Ignored
|
|
quantal |
Ignored
|
|
raring |
Ignored
|
|
upstream |
Ignored
|
|
ruby1.9.1 Launchpad, Ubuntu, Debian |
lucid |
Ignored
|
precise |
Ignored
|
|
quantal |
Ignored
|
|
raring |
Ignored
|
|
upstream |
Ignored
|
|
rubygems Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Ignored
|
|
quantal |
Ignored
|
|
raring |
Ignored
|
|
upstream |
Needs triage
|