Public Date:
451828: CVE-2008-2726 ruby: integer overflow in rb_ary_splice/update/replace() - beg + rlen

The MITRE CVE dictionary describes this issue as:

Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.

Find out more about CVE-2008-2726 from the MITRE CVE dictionary dictionary and NIST NVD.

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 3 (ruby) RHSA-2008:0562 2008-07-14
Red Hat Enterprise Linux 4 (ruby) RHSA-2008:0561 2008-07-14
Red Hat Enterprise Linux 2.1 (ruby) RHSA-2008:0562 2008-07-14
Red Hat Enterprise Linux 5 (ruby) RHSA-2008:0561 2008-07-14


Red Hat would like to thank Drew Yao of the Apple Product Security team for reporting this issue.

Last Modified

CVE description copyright © 2017, The MITRE Corporation


Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.