Sha256: adfc7402b45e005066d853b0bd48b243d4db0267ddfe01d5a5483714d8cb120d
Contents?: true
Size: 782 Bytes
Versions: 1
Compression:
Stored size: 782 Bytes
Contents
--- gem: rubygems-update library: rubygems cve: 2013-4363 osvdb: 97163 url: http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html title: RubyGems Multiple API Call Version Validation CPU Consumption DoS date: 2013-09-24 description: | RubyGems contains a flaw that may allow a denial of service. The issue is triggered when handling the gem build, Gem::Package, or Gem::PackageTask API calls, which attempt to validate the version of the program. This may allow a context-dependent attacker to cause a consumption of CPU resources and crash the program. This vulnerability is due to an incomplete fix for CVE-2013-4287, which allowed a denial of service via improper validation. cvss_v2: 4.3 patched_versions: - ~> 1.8.23.2 - ~> 1.8.27 - ~> 2.0.10 - ">= 2.1.5"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/rubygems-update/CVE-2013-4363.yml |