Unrated severityNVD Advisory· Published Dec 30, 2011· Updated Apr 29, 2026
CVE-2011-4838
CVE-2011-4838
Description
JRuby before 1.6.5.1 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- jruby.org/2011/12/27/jruby-1-6-5-1.htmlnvdVendor Advisory
- secunia.com/advisories/47407nvdThird Party Advisory
- secunia.com/advisories/50084nvdThird Party Advisory
- security.gentoo.org/glsa/glsa-201207-06.xmlnvdThird Party Advisory
- www.kb.cert.org/vuls/id/903934nvdThird Party AdvisoryUS Government Resource
- www.nruns.com/_downloads/advisory28122011.pdfnvdThird Party Advisory
- www.ocert.org/advisories/ocert-2011-003.htmlnvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/72019nvdThird Party AdvisoryVDB Entry
- archives.neohapsis.com/archives/bugtraq/2011-12/0181.htmlnvdBroken Link
- rhn.redhat.com/errata/RHSA-2012-1232.htmlnvdBroken Link
News mentions
0No linked articles in our index yet.