Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2013-4363

Published: 17 October 2013

Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.

Notes

AuthorNote
tyhicks
rubygems is for users of ruby1.8. ruby1.9.1 and jruby ship an
embedded rubygems.
jdstrand
per mdeslaur in CVE-2013-4287, we don't consider this to be a security issue

Priority

Low

Status

Package Release Status
jruby
Launchpad, Ubuntu, Debian
lucid Ignored

precise Ignored

quantal Ignored

raring Ignored

upstream Ignored

ruby1.9.1
Launchpad, Ubuntu, Debian
lucid Ignored

precise Ignored

quantal Ignored

raring Ignored

upstream Ignored

rubygems
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Ignored

quantal Ignored

raring Ignored

upstream Needs triage