Sha256: 4c08c276d69e29fb7c7b5adec37da07bdc797b59076d3e290b915c957c7652a5

Contents?: true

Size: 474 Bytes

Versions: 6

Compression:

Stored size: 474 Bytes

Contents

---
engine: ruby
cve: 2014-3916
osvdb: 107478
url: http://www.osvdb.org/show/osvdb/107478
title: Ruby string.c str_buf_cat() Function Crafted String Handling Remote DoS
date: 2014-04-07
description: |
  Ruby contains a flaw in the str_buf_cat() function in string.c that is
  triggered when handling an overly long string. This may allow a remote
  attacker to cause a denial of service.
cvss_v2: 5.0
patched_versions:
  - ~> 2.0.0.576
  - ~> 2.1.3
  - ">= 2.2.0.preview.1"

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/rubies/ruby/CVE-2014-3916.yml
bundler-budit-0.6.2 data/ruby-advisory-db/rubies/ruby/OSVDB-107478.yml
bundler-budit-0.6.1 data/ruby-advisory-db/rubies/ruby/OSVDB-107478.yml
bundler-audit-0.6.1 data/ruby-advisory-db/rubies/ruby/OSVDB-107478.yml
bundler-audit-0.6.0 data/ruby-advisory-db/rubies/ruby/OSVDB-107478.yml
bundler-audit-0.5.0 data/ruby-advisory-db/rubies/ruby/OSVDB-107478.yml