CVE-2012-4481
Published: 5 October 2012
The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.
Notes
Author | Note |
---|---|
tyhicks | Supplements incomplete fix for CVE-2011-1005 |
Priority
Status
Package | Release | Status |
---|---|---|
ruby1.8 Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Released
(1.8.7.249-2ubuntu0.2)
|
|
natty |
Released
(1.8.7.302-2ubuntu0.2)
|
|
oneiric |
Released
(1.8.7.352-2ubuntu0.2)
|
|
precise |
Released
(1.8.7.352-2ubuntu1.1)
|
|
quantal |
Released
(1.8.7.358-4ubuntu0.1)
|
|
upstream |
Released
(1.8.7.358-5)
|
|
Patches: upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068 |
||
ruby1.9 Launchpad, Ubuntu, Debian |
hardy |
Ignored
(end of life)
|
lucid |
Not vulnerable
|
|
maverick |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
upstream |
Needs triage
|
|
ruby1.9.1 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Not vulnerable
|
|
natty |
Not vulnerable
|
|
oneiric |
Not vulnerable
|
|
precise |
Not vulnerable
|
|
quantal |
Not vulnerable
|
|
upstream |
Not vulnerable
|