Name | CVE-2018-10199 |
Description | In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 896021 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
mruby (PTS) | bullseye | 2.1.2-3 | fixed |
| bookworm | 3.1.0-3 | fixed |
| sid, trixie | 3.3.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
mruby | source | jessie | (not affected) | | | |
mruby | source | stretch | (not affected) | | | |
mruby | source | (unstable) | 1.4.0+20180418+git54905e98-1 | | | 896021 |
Notes
[stretch] - mruby <not-affected> (Vulnerable code introduced later)
[jessie] - mruby <not-affected> (Vulnerable code introduced later)
https://github.com/mruby/mruby/issues/4001
https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433