The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.
lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
lists.apple.com/archives/security-announce/2013/Oct/msg00006.html
lists.opensuse.org/opensuse-updates/2013-04/msg00070.html
lists.opensuse.org/opensuse-updates/2013-04/msg00071.html
lists.opensuse.org/opensuse-updates/2013-04/msg00075.html
lists.opensuse.org/opensuse-updates/2013-04/msg00078.html
lists.opensuse.org/opensuse-updates/2013-04/msg00079.html
rhn.redhat.com/errata/RHSA-2013-0699.html
rhn.redhat.com/errata/RHSA-2014-1863.html
support.apple.com/kb/HT5784
weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/
access.redhat.com/errata/RHSA-2013:0699
access.redhat.com/errata/RHSA-2014:1863
access.redhat.com/security/cve/CVE-2013-1854
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=921329
groups.google.com/group/ruby-security-ann/msg/34e0d780b04308de?dmode=source&output=gplain
rhn.redhat.com/errata/RHSA-2013-0699.html