CVE-2017-0898
15.09.2017, 19:29
Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.Enginsight
Vendor | Product | Version |
---|---|---|
ruby-lang | ruby | 2.2.0 |
ruby-lang | ruby | 2.2.1 |
ruby-lang | ruby | 2.2.2 |
ruby-lang | ruby | 2.2.3 |
ruby-lang | ruby | 2.2.4 |
ruby-lang | ruby | 2.2.5 |
ruby-lang | ruby | 2.2.6 |
ruby-lang | ruby | 2.2.7 |
ruby-lang | ruby | 2.3.0 |
ruby-lang | ruby | 2.3.1 |
ruby-lang | ruby | 2.3.2 |
ruby-lang | ruby | 2.3.3 |
ruby-lang | ruby | 2.3.4 |
ruby-lang | ruby | 2.4.0 |
ruby-lang | ruby | 2.4.1 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References