Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
[
{
"product": "Ruby",
"vendor": "HackerOne",
"versions": [
{
"status": "affected",
"version": "Versions before 2.4.2, 2.3.5, and 2.2.8"
}
]
}
]
www.securityfocus.com/bid/100862
www.securitytracker.com/id/1039363
access.redhat.com/errata/RHSA-2017:3485
access.redhat.com/errata/RHSA-2018:0378
access.redhat.com/errata/RHSA-2018:0583
access.redhat.com/errata/RHSA-2018:0585
github.com/mruby/mruby/issues/3722
hackerone.com/reports/212241
lists.debian.org/debian-lts-announce/2018/07/msg00012.html
security.gentoo.org/glsa/201710-18
usn.ubuntu.com/3685-1/
www.debian.org/security/2017/dsa-4031
www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/