Описание
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 1.8.4-1ubuntu1.6 |
| devel | not-affected | 1.8.7.72-1 |
| feisty | released | 1.8.5-4ubuntu2.3 |
| gutsy | released | 1.8.6.36-1ubuntu3.3 |
| hardy | released | 1.8.6.111-2ubuntu1.2 |
| intrepid | not-affected | 1.8.7.72-1 |
| jaunty | not-affected | 1.8.7.72-1 |
| karmic | not-affected | 1.8.7.72-1 |
| lucid | not-affected | 1.8.7.72-1 |
| maverick | not-affected | 1.8.7.72-1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | ignored | end of life |
| devel | DNE | pulled 2010-07-27 |
| feisty | ignored | end of life, was needed |
| gutsy | ignored | end of life, was needed |
| hardy | ignored | end of life |
| intrepid | released | 1.9.0.2-7 |
| jaunty | released | 1.9.0.2-7 |
| karmic | released | 1.9.0.2-7 |
| lucid | released | 1.9.0.2-7 |
| maverick | DNE | pulled 2010-07-27 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
Integer overflow in the rb_ary_fill function in array.c in Ruby before ...
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
EPSS
7.5 High
CVSS2