Required CVE Record Information
Description
Rubygems.org is the Ruby community's gem hosting service. A Gem publisher can cause a Remote DoS when publishing a Gem. This is due to how Ruby reads the Manifest of Gem files when using Gem::Specification.from_yaml. from_yaml makes use of SafeYAML.load which allows YAML aliases inside the YAML-based metadata of a gem. YAML aliases allow for Denial of Service attacks with so-called `YAML-bombs` (comparable to Billion laughs attacks). This was patched. There is is no action required by users. This issue is also tracked as GHSL-2024-001 and was discovered by the GitHub security lab.
CVSS 1 Total
Score | Severity | Version | Vector String |
---|---|---|---|
4.3 | MEDIUM | 3.1 | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L |
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 3 Total
- github.com: https://github.com/rubygems/rubygems.org/security/advisories/GHSA-4vc5-whwr-7hh2 x_transferred
- en.wikipedia.org: https://en.wikipedia.org/wiki/Billion_laughs_attack x_transferred
- github.com: https://github.com/ruby/ruby/blob/7cf74a2ff28b1b4c26e367d0d67521f7e1fed239/lib/rubygems/safe_yaml.rb#L28 x_transferred