Description
Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1113-1 | ruby1.8 security update |
Debian DLA |
DLA-1114-1 | ruby1.9.1 security update |
Debian DLA |
DLA-1421-1 | ruby2.1 security update |
Debian DSA |
DSA-4031-1 | ruby2.3 security update |
EUVD |
EUVD-2017-1251 | Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap. |
Ubuntu USN |
USN-3439-1 | Ruby vulnerabilities |
Ubuntu USN |
USN-3685-1 | Ruby vulnerabilities |
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-17T01:36:46.258Z
Reserved: 2016-11-30T00:00:00.000Z
Link: CVE-2017-0898
No data.
Status : Modified
Published: 2017-09-15T19:29:00.190
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-0898
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN