org.jruby:jruby-stdlib@1.7.0.preview2 vulnerabilities

  • latest version

    10.0.0.1

  • latest non vulnerable version

  • first published

    14 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.jruby:jruby-stdlib package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Memory Allocation with Excessive Size Value

    org.jruby:jruby-stdlib is a JRuby Lib Setup package.

    Affected versions of this package are vulnerable to Memory Allocation with Excessive Size Value in the ResponseReader class. An attacker can cause the application to allocate excessive memory and trigger a denial of service by including "literal" strings in responses sent to client-initiated connections and IMAP commands.

    After implementing the fix, the default max_response_size is still high (512MiB) to accommodate backward compatibility. It is recommended to set a lower max_response_size if connecting to untrusted servers or using insecure connections.

    How to fix Memory Allocation with Excessive Size Value?

    A fix was pushed into the master branch but not yet published.

    [,9.4.13.0)[10.0.0.0,)