Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2012-4464

Published: 3 October 2012

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks the string as tainted, a different vulnerability than CVE-2012-4466. NOTE: this issue might exist because of a CVE-2011-1005 regression.

Notes

AuthorNote
mdeslaur
affects 1.9.3p0 and newer

Priority

Medium

Status

Package Release Status
ruby1.8
Launchpad, Ubuntu, Debian
hardy Ignored
(end of life)
lucid Not vulnerable

natty Not vulnerable

oneiric Not vulnerable

precise Not vulnerable

quantal Not vulnerable

upstream Needed

ruby1.9
Launchpad, Ubuntu, Debian
hardy Not vulnerable

lucid Not vulnerable

maverick Does not exist

natty Does not exist

oneiric Does not exist

precise Does not exist

quantal Does not exist

upstream Needs triage

ruby1.9.1
Launchpad, Ubuntu, Debian
hardy Does not exist

lucid Not vulnerable
(1.9.1.378-1)
natty Not vulnerable
(1.9.2.0-2)
oneiric Not vulnerable
(1.9.2.290-2)
precise
Released (1.9.3.0-1ubuntu2.3)
quantal
Released (1.9.3.194-1ubuntu1.1)
upstream Needs triage

Patches:
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068 (first 2 hunks of error.c diff)