CVE-2012-4464
Published: 3 October 2012
Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.
Notes
Author | Note |
---|---|
mdeslaur | affects 1.9.3p0 and newer |
Priority
Status
Package | Release | Status |
---|---|---|
ruby1.8 Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Not vulnerable
|
|
natty |
Not vulnerable
|
|
oneiric |
Not vulnerable
|
|
precise |
Not vulnerable
|
|
quantal |
Not vulnerable
|
|
upstream |
Needed
|
|
ruby1.9 Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
|
lucid |
Not vulnerable
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
upstream |
Needs triage
|
|
ruby1.9.1 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Not vulnerable
(1.9.1.378-1)
|
|
natty |
Not vulnerable
(1.9.2.0-2)
|
|
oneiric |
Not vulnerable
(1.9.2.290-2)
|
|
precise |
Released
(1.9.3.0-1ubuntu2.3)
|
|
quantal |
Released
(1.9.3.194-1ubuntu1.1)
|
|
upstream |
Needs triage
|
|
Patches: upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068 (first 2 hunks of error.c diff) |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4464
- http://www.openwall.com/lists/oss-security/2012/10/03
- http://www.openwall.com/lists/oss-security/2012/10/03/9
- https://ubuntu.com/security/notices/USN-1602-1
- https://ubuntu.com/security/notices/USN-1614-1
- NVD
- Launchpad
- Debian