Sha256: 5c37aeb20540ecd976f6e94c4cae2f686a155edb6f2171818663308355d60967
Contents?: true
Size: 671 Bytes
Versions: 6
Compression:
Stored size: 671 Bytes
Contents
--- engine: ruby cve: 2008-2376 url: http://www.openwall.com/lists/oss-security/2008/07/02/3 title: More ruby integer overflows (rb_ary_fill / Array#fill) date: 2008-06-30 description: | Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows. cvss_v2: 7.5 patched_versions: - ~> 1.8.6.286 - ~> 1.8.7.71 - ">= 1.9.0"
Version data entries
6 entries across 6 versions & 2 rubygems