In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
References
Link | Resource |
---|---|
https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 | Patch |
https://github.com/mruby/mruby/issues/4001 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:22:15
Updated: 2022-10-03T16:22:15
Reserved: 2022-10-03T00:00:00
Link: CVE-2018-10199
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-04-18T15:29:00.207
Modified: 2018-05-22T16:53:53.273
Link: CVE-2018-10199
JSON object: View
Redhat Information
No data.
CWE