RubyGems Regular Expression Denial of Service vulnerability
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Aug 16, 2023
Package
Affected versions
< 1.8.23.1
>= 1.8.24, < 1.8.26
>= 2.0.0, < 2.0.8
>= 2.1.0.rc.1, < 2.1.0
Patched versions
1.8.23.1
1.8.26
2.0.8
2.1.0
Description
Published by the National Vulnerability Database
Oct 17, 2013
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Mar 8, 2023
Last updated
Aug 16, 2023
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in
lib/rubygems/version.rb
in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression.References