Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2013-4287

Published: 17 October 2013

Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.

Notes

AuthorNote
tyhicks
rubygems is for users of ruby1.8. ruby1.9.1 and jruby ship an
embedded rubygems.
mdeslaur
we don't consider this to be a security issue

Priority

Low

Status

Package Release Status
jruby
Launchpad, Ubuntu, Debian
lucid Ignored

precise Ignored

quantal Ignored

raring Ignored

upstream Needs triage

ruby1.9.1
Launchpad, Ubuntu, Debian
lucid Ignored

precise Ignored

quantal Ignored

raring Ignored

upstream Needs triage

rubygems
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Ignored

quantal Ignored

raring Ignored

upstream Needs triage