CVE-2014-4975
Published: 17 July 2014
Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
Notes
Author | Note |
---|---|
mdeslaur |
not likely to be exposed, and stack protector limits to DoS |
Priority
Status
Package | Release | Status |
---|---|---|
ruby1.8
Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Not vulnerable
(1.8.7.352-2ubuntu1.4)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
ruby1.9
Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Does not exist
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
ruby1.9.1
Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(1.9.3.0-1ubuntu2.9)
|
|
trusty |
Released
(1.9.3.484-2ubuntu1.1)
|
|
upstream |
Needs triage
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Ignored
(end of life)
|
|
wily |
Does not exist
|
|
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. | ||
ruby2.0
Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
trusty |
Released
(2.0.0.484-1ubuntu2.1)
|
|
upstream |
Needs triage
|
|
utopic |
Released
(2.0.0.484+really457-3ubuntu1.1)
|
|
vivid |
Does not exist
|
|
wily |
Does not exist
|
|
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. | ||
ruby2.1
Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
utopic |
Released
(2.1.2-2ubuntu1.1)
|
|
vivid |
Released
(2.1.2-2ubuntu2)
|
|
wily |
Released
(2.1.2-2ubuntu2)
|
|
Patches:
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=46778 |
||
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. |