We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent c26fbc1 commit c9589a4Copy full SHA for c9589a4
1 file changed
gems/rubyzip/CVE-2019-16892.yml
@@ -0,0 +1,13 @@
1
+---
2
+gem: rubyzip
3
+cve: 2019-16892
4
+url: https://github.com/rubyzip/rubyzip/pull/403
5
+date: 2019-09-12
6
+title: Denial of Service in rubyzip ("zip bombs")
7
+description: |
8
+ In Rubyzip before 1.3.0, a crafted ZIP file can bypass application
9
+ checks on ZIP entry sizes because data about the uncompressed size
10
+ can be spoofed. This allows attackers to cause a denial of service
11
+ (disk consumption).
12
+patched_versions:
13
+ - ">= 1.3.0"
0 commit comments