The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.
lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
lists.opensuse.org/opensuse-updates/2013-04/msg00070.html
lists.opensuse.org/opensuse-updates/2013-04/msg00071.html
lists.opensuse.org/opensuse-updates/2013-04/msg00075.html
lists.opensuse.org/opensuse-updates/2013-04/msg00078.html
lists.opensuse.org/opensuse-updates/2013-04/msg00079.html
rhn.redhat.com/errata/RHSA-2013-0699.html
rhn.redhat.com/errata/RHSA-2014-1863.html
support.apple.com/kb/HT5784
weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released
access.redhat.com/errata/RHSA-2013:0699
access.redhat.com/errata/RHSA-2014:1863
access.redhat.com/security/cve/CVE-2013-1854
bugzilla.redhat.com/show_bug.cgi?id=921329
github.com/rubysec/ruby-advisory-db/blob/master/gems/activerecord/CVE-2013-1854.yml
groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain
nvd.nist.gov/vuln/detail/CVE-2013-1854