Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "2.2.0"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.4"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.5"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.6"
},
{
"introduced": "0"
},
{
"last_affected": "2.2.7"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.0"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.1"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.2"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.3"
},
{
"introduced": "0"
},
{
"last_affected": "2.3.4"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.0"
},
{
"introduced": "0"
},
{
"last_affected": "2.4.1"
}
]
}