Numeric Errors Affecting ruby-libs package, versions <0:1.8.5-5.el5_2.3


Severity

Recommended
medium

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
2.54% (90th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE5-RUBYLIBS-2447225
  • published10 Apr 2022
  • disclosed9 Jul 2008

Introduced: 9 Jul 2008

CVE-2008-2376  (opens in a new tab)
CWE-189  (opens in a new tab)

How to fix?

Upgrade Oracle:5 ruby-libs to version 0:1.8.5-5.el5_2.3 or higher.
This issue was patched in ELSA-2008-0561.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ruby-libs package and not the ruby-libs package as distributed by Oracle. See How to fix? for Oracle:5 relevant fixed versions and status.

Integer overflow in the rb_ary_fill function in array.c in Ruby before revision 17756 allows context-dependent attackers to cause a denial of service (crash) or possibly have unspecified other impact via a call to the Array#fill method with a start (aka beg) argument greater than ARY_MAX_SIZE. NOTE: this issue exists because of an incomplete fix for other closely related integer overflows.

References

CVSS Scores

version 3.1