CVE-2015-7551
Published: 23 March 2016
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.
Priority
CVSS 3 base score: 8.4
Status
Package | Release | Status |
---|---|---|
ruby1.9.1 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [code not present])
|
|
ruby2.0 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was released [2.0.0.484-1ubuntu2.4])
|
|
ruby2.1 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Patches: Upstream: https://github.com/ruby/ruby/commit/339e11a7f178312d937b7c95dd3115ce7236597a (fiddle) |
||
ruby2.2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.2.4-1)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
ruby2.3 Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.3.0)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(2.3.1-2~16.04)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
Notes
Author | Note |
---|---|
mdeslaur | This is the same issue as CVE-2009-5147, except for other releases than 1.9.1 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7551
- https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
- https://usn.ubuntu.com/usn/usn-3365-1
- NVD
- Launchpad
- Debian