CVE-2018-10199

NameCVE-2018-10199
DescriptionIn versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs896021

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mruby (PTS)buster2.0.0-1fixed
bullseye2.1.2-3fixed
bookworm3.1.0-3fixed
sid, trixie3.3.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mrubysourcejessie(not affected)
mrubysourcestretch(not affected)
mrubysource(unstable)1.4.0+20180418+git54905e98-1896021

Notes

[stretch] - mruby <not-affected> (Vulnerable code introduced later)
[jessie] - mruby <not-affected> (Vulnerable code introduced later)
https://github.com/mruby/mruby/issues/4001
https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433

Search for package or bug name: Reporting problems