Описание
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.8.4-1ubuntu1.6 |
devel | not-affected | 1.8.7.72-1 |
feisty | released | 1.8.5-4ubuntu2.3 |
gutsy | released | 1.8.6.36-1ubuntu3.3 |
hardy | released | 1.8.6.111-2ubuntu1.2 |
intrepid | not-affected | 1.8.7.72-1 |
jaunty | not-affected | 1.8.7.72-1 |
karmic | not-affected | 1.8.7.72-1 |
lucid | not-affected | 1.8.7.72-1 |
maverick | not-affected | 1.8.7.72-1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | DNE | pulled 2010-07-27 |
feisty | ignored | end of life, was needed |
gutsy | ignored | end of life, was needed |
hardy | ignored | end of life |
intrepid | released | 1.9.0.2-7 |
jaunty | released | 1.9.0.2-7 |
karmic | released | 1.9.0.2-7 |
lucid | released | 1.9.0.2-7 |
maverick | DNE | pulled 2010-07-27 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
Integer overflow in the rb_ary_fill function in array.c in Ruby before ...
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
EPSS
7.5 High
CVSS2