CVE-2008-2726

Impact:
Moderate
Public Date:
2008-06-20
CWE:
CWE-190
Bugzilla:
451828: CVE-2008-2726 ruby: integer overflow in rb_ary_splice/update/replace() - beg + rlen

The MITRE CVE dictionary describes this issue as:

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

Find out more about CVE-2008-2726 from the MITRE CVE dictionary dictionary and NIST NVD.

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 3 (ruby) RHSA-2008:0562 2008-07-14
Red Hat Enterprise Linux 4 (ruby) RHSA-2008:0561 2008-07-14
Red Hat Enterprise Linux 2.1 (ruby) RHSA-2008:0562 2008-07-14
Red Hat Enterprise Linux 5 (ruby) RHSA-2008:0561 2008-07-14

Acknowledgements

Red Hat would like to thank Drew Yao of the Apple Product Security team for reporting this issue.

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.