The HTTP/XMLRPC server in Ruby before 1.8.2 uses blocking sockets, which allows attackers to cause a denial of service (blocked connections) via a large amount of data.
ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.2-webrick-dos-1.patch
ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.2-xmlrpc-dos-1.patch
blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-dev/27787
secunia.com/advisories/16904
secunia.com/advisories/19772
secunia.com/advisories/19804
secunia.com/advisories/20024
secunia.com/advisories/20064
secunia.com/advisories/20457
secunia.com/advisories/21657
securitytracker.com/id?1015978
www.debian.org/security/2006/dsa-1157
www.gentoo.org/security/en/glsa/glsa-200605-11.xml
www.mandriva.com/security/advisories?name=MDKSA-2006:079
www.novell.com/linux/security/advisories/2006-06-02.html
www.osvdb.org/24972
www.redhat.com/support/errata/RHSA-2006-0427.html
www.securityfocus.com/bid/17645
bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189540
exchange.xforce.ibmcloud.com/vulnerabilities/26102
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11100
usn.ubuntu.com/273-1/