Name | CVE-2017-0898 |
Description | Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or an information disclosure from the heap. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1113-1, DLA-1114-1, DLA-1421-1, DSA-4031-1 |
Debian Bugs | 875936 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ruby1.8 | source | wheezy | 1.8.7.358-7.1+deb7u4 | DLA-1113-1 | ||
ruby1.8 | source | (unstable) | (unfixed) | |||
ruby1.9.1 | source | wheezy | 1.9.3.194-8.1+deb7u6 | DLA-1114-1 | ||
ruby1.9.1 | source | (unstable) | (unfixed) | |||
ruby2.1 | source | jessie | 2.1.5-2+deb8u4 | DLA-1421-1 | ||
ruby2.1 | source | (unstable) | (unfixed) | |||
ruby2.3 | source | stretch | 2.3.3-1+deb9u2 | DSA-4031-1 | ||
ruby2.3 | source | (unstable) | 2.3.5-1 | 875936 |
https://github.com/mruby/mruby/issues/3722
https://www.ruby-lang.org/en/news/2017/09/14/sprintf-buffer-underrun-cve-2017-0898/
https://bugs.ruby-lang.org/issues/13499