Your submission was sent successfully! Close

CVE-2012-4466

Published: 3 October 2012

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.

Notes

AuthorNote
tyhicks
affects 1.8.x, as well as 1.9.3-p0 and newer
Priority

Medium

Status

Package Release Status
ruby1.8
Launchpad, Ubuntu, Debian
hardy Ignored
(reached end-of-life)
lucid
Released (1.8.7.249-2ubuntu0.2)
natty
Released (1.8.7.302-2ubuntu0.2)
oneiric
Released (1.8.7.352-2ubuntu0.2)
precise
Released (1.8.7.352-2ubuntu1.1)
quantal
Released (1.8.7.358-4ubuntu0.1)
upstream Needs triage

Patches:
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068 (last hunk in error.c diff)

ruby1.9
Launchpad, Ubuntu, Debian
hardy Not vulnerable

lucid Not vulnerable

maverick Does not exist

natty Does not exist

oneiric Does not exist

precise Does not exist

quantal Does not exist

upstream Not vulnerable

ruby1.9.1
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Not vulnerable

natty Not vulnerable

oneiric Not vulnerable
(1.9.2.290-2)
precise
Released (1.9.3.0-1ubuntu2.3)
quantal
Released (1.9.3.194-1ubuntu1.1)
upstream Needs triage

Patches:

upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068 (last hunk in error.c diff)