Sha256: 2a48eb720706f5cf68089f18630eb7453cdf1619a1bc64182e79b206bd2ed2aa

Contents?: true

Size: 682 Bytes

Versions: 3

Compression:

Stored size: 682 Bytes

Contents

---
engine: ruby
cve: 2017-0898
url: https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/
title: Buffer underrun vulnerability in Kernel.sprintf
date: 2017-09-14
description: |
  There is a buffer underrun vulnerability in the sprintf method of Kernel module.

  If a malicious format string which contains a precious specifier (*) is
  passed and a huge minus value is also passed to the specifier, buffer
  underrun may be caused. In such situation, the result may contains heap, or
  the Ruby interpreter may crash.

  All users running an affected release should upgrade immediately.
patched_versions:
  - "~> 2.2.8"
  - "~> 2.3.5"
  - ">= 2.4.2"

Version data entries

3 entries across 3 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/rubies/ruby/CVE-2017-0898.yml
bundler-budit-0.6.2 data/ruby-advisory-db/rubies/ruby/CVE-2017-0898.yml
bundler-budit-0.6.1 data/ruby-advisory-db/rubies/ruby/CVE-2017-0898.yml