First published: Wed Jul 09 2008(Updated: )
Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Fedora 8 | =1.8.6.230 | |
Ruby-lang Ruby | =1.8.6.230 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.