Description
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1612-1 | New ruby1.8 packages fix several vulnerabilities |
Debian DSA |
DSA-1618-1 | New ruby1.9 packages fix several vulnerabilities |
Ubuntu USN |
USN-651-1 | Ruby vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T08:58:02.531Z
Reserved: 2008-05-21T00:00:00.000Z
Link: CVE-2008-2376
No data.
Status : Deferred
Published: 2008-07-09T00:41:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-2376
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN