Your submission was sent successfully! Close

CVE-2012-4464

Published: 3 October 2012

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.

Notes

AuthorNote
mdeslaur
affects 1.9.3p0 and newer
Priority

Medium

Status

Package Release Status
ruby1.8
Launchpad, Ubuntu, Debian
hardy Ignored
(reached end-of-life)
lucid Not vulnerable

natty Not vulnerable

oneiric Not vulnerable

precise Not vulnerable

quantal Not vulnerable

upstream Needed

ruby1.9
Launchpad, Ubuntu, Debian
hardy Not vulnerable

lucid Not vulnerable

maverick Does not exist

natty Does not exist

oneiric Does not exist

precise Does not exist

quantal Does not exist

upstream Needs triage

ruby1.9.1
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Not vulnerable
(1.9.1.378-1)
natty Not vulnerable
(1.9.2.0-2)
oneiric Not vulnerable
(1.9.2.290-2)
precise
Released (1.9.3.0-1ubuntu2.3)
quantal
Released (1.9.3.194-1ubuntu1.1)
upstream Needs triage

Patches:
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068 (first 2 hunks of error.c diff)