CVE-2017-6181

Metadata

medium
5.0
ruby1.8, ruby1.9.1, ruby2.0, ruby2.3
CVE-2017-6181
cve.mitre.org, bugs.ruby-lang.org, github.com, bugs.ruby-lang.org
2017-04-03
2017-06-16 19:22
CVE-2017-6181 ruby2.1
CVE-2017-6181 ruby2.3
2017-04-04 02:03

Description

The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted regular expression.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

None

Unaffected

Release Package Reason
upstream ruby1.8 not-affected
ruby1.9.1 not-affected
ruby2.0 not-affected
ruby2.3 not-affected
precise ruby1.8 not-affected
ruby1.9.1 not-affected
ruby2.0 DNE
ruby2.3 DNE
trusty ruby1.8 DNE
ruby1.9.1 not-affected
ruby2.0 not-affected
ruby2.3 DNE
vivid/ubuntu-core ruby1.8 DNE
ruby1.9.1 DNE
ruby2.0 DNE
ruby2.3 DNE
vivid/stable-phone-overlay ruby1.8 DNE
ruby1.9.1 DNE
ruby2.0 DNE
ruby2.3 DNE
xenial ruby1.8 DNE
ruby1.9.1 DNE
ruby2.0 DNE
ruby2.3 not-affected
yakkety ruby1.8 DNE
ruby1.9.1 DNE
ruby2.0 DNE
ruby2.3 not-affected
devel ruby1.8 DNE
ruby1.9.1 DNE
ruby2.0 DNE
ruby2.3 not-affected