Description
Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format
string which contains a precious specifier (*) with a huge minus value.
Such situation can lead to a buffer overrun, resulting in a heap memory
corruption or an information disclosure from the heap.
Notes
| mdeslaur | backported patch in debian (2.3.3-1+deb9u2) package |
Package
| Upstream: | needs-triage
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was released [1.9.3.484-2ubuntu1.5])
|
Patches:
Package
| Upstream: | needs-triage
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 14.04 ESM: | DNE
(trusty was released [2.0.0.484-1ubuntu2.10])
|
Patches:
Package
| Upstream: | released
(2.3.5)
|
| Ubuntu 18.04 LTS: | DNE
|
| Ubuntu 16.04 ESM: | released
(2.3.1-2~16.04.10)
|
| Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-04-13 12:51:14 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)