rubygems: CVE-2013-4287: Algorithmic complexity vulnerability in RubyGems 2.0.7 and older

Related Vulnerabilities: CVE-2013-4287  

Debian Bug report logs - #722361
rubygems: CVE-2013-4287: Algorithmic complexity vulnerability in RubyGems 2.0.7 and older

version graph

Reported by: Henri Salo <henri@nerv.fi>

Date: Tue, 10 Sep 2013 15:51:02 UTC

Severity: important

Tags: fixed-upstream, security

Found in versions libgems-ruby/1.3.7-3, rubygems/1.8.24-1

Fixed in version 1.8.24-1+rm

Done: Debian FTP Masters <ftpmaster@ftp-master.debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Daigo Moriwaki <daigo@debian.org>:
Bug#722361; Package rubygems. (Tue, 10 Sep 2013 15:51:06 GMT) (full text, mbox, link).


Acknowledgement sent to Henri Salo <henri@nerv.fi>:
New Bug report received and forwarded. Copy sent to Daigo Moriwaki <daigo@debian.org>. (Tue, 10 Sep 2013 15:51:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Henri Salo <henri@nerv.fi>
To: submit@bugs.debian.org
Subject: rubygems: CVE-2013-4287: Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
Date: Tue, 10 Sep 2013 18:48:37 +0300
[Message part 1 (text/plain, inline)]
Package: rubygems
Version: 1.8.24-1
Severity: important
Tags: security, fixed-upstream

RubyGems validates versions with a regular expression that is vulnerable to
denial of service due to backtracking.  For specially crafted RubyGems
versions attackers can cause denial of service through CPU consumption.

More information: http://www.openwall.com/lists/oss-security/2013/09/10/1

Please update affected versions accordingly and use CVE in the changelog.

---
Henri Salo
[signature.asc (application/pgp-signature, inline)]

Marked as found in versions libgems-ruby/1.3.7-3. Request was from Henri Salo <henri@nerv.fi> to control@bugs.debian.org. (Tue, 10 Sep 2013 15:57:04 GMT) (full text, mbox, link).


Information forwarded to debian-bugs-dist@lists.debian.org, Daigo Moriwaki <daigo@debian.org>:
Bug#722361; Package rubygems. (Thu, 19 Sep 2013 05:03:07 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
Extra info received and forwarded to list. Copy sent to Daigo Moriwaki <daigo@debian.org>. (Thu, 19 Sep 2013 05:03:07 GMT) (full text, mbox, link).


Message #12 received at 722361@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Henri Salo <henri@nerv.fi>, 722361@bugs.debian.org
Subject: Re: Bug#722361: rubygems: CVE-2013-4287: Algorithmic complexity vulnerability in RubyGems 2.0.7 and older
Date: Thu, 19 Sep 2013 07:01:46 +0200
Hi

Please see also the followups

http://article.gmane.org/gmane.comp.security.oss.general/11137

Regards,
Salvatore



Reply sent to Debian FTP Masters <ftpmaster@ftp-master.debian.org>:
You have taken responsibility. (Fri, 31 Jan 2014 19:33:15 GMT) (full text, mbox, link).


Notification sent to Henri Salo <henri@nerv.fi>:
Bug acknowledged by developer. (Fri, 31 Jan 2014 19:33:16 GMT) (full text, mbox, link).


Message #17 received at 722361-done@bugs.debian.org (full text, mbox, reply):

From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
To: 495320-done@bugs.debian.org,529663-done@bugs.debian.org,533304-done@bugs.debian.org,533334-done@bugs.debian.org,576113-done@bugs.debian.org,585838-done@bugs.debian.org,595168-done@bugs.debian.org,637914-done@bugs.debian.org,645230-done@bugs.debian.org,689069-done@bugs.debian.org,691737-done@bugs.debian.org,709412-done@bugs.debian.org,713165-done@bugs.debian.org,722361-done@bugs.debian.org,733985-done@bugs.debian.org,735576-done@bugs.debian.org,
Cc: rubygems@packages.debian.org, rubygems@packages.qa.debian.org
Subject: Bug#736762: Removed package(s) from unstable
Date: Fri, 31 Jan 2014 19:19:18 +0000
Version: 1.8.24-1+rm

Dear submitter,

as the package rubygems has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/736762

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmaster@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Ansgar Burchardt (the ftpmaster behind the curtain)



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 01 Mar 2014 07:35:25 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Fri Oct 16 10:35:27 2020; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.