CVE-2017-14064
31.08.2017, 17:29
Ruby through 2.2.7, 2.3.x through 2.3.4, and 2.4.x through 2.4.1 can expose arbitrary memory during a JSON.generate call. The issues lies in using strdup in ext/json/ext/generator/generator.c, which will stop after encountering a '\0' byte, returning a pointer to a string of length zero, which is not the length stored in space_len.Enginsight
Vendor | Product | Version |
---|---|---|
ruby-lang | ruby | 𝑥 ≤ 2.2.7 |
ruby-lang | ruby | 2.3.0 |
ruby-lang | ruby | 2.3.0:preview1 |
ruby-lang | ruby | 2.3.0:preview2 |
ruby-lang | ruby | 2.3.1 |
ruby-lang | ruby | 2.3.2 |
ruby-lang | ruby | 2.3.3 |
ruby-lang | ruby | 2.3.4 |
ruby-lang | ruby | 2.4.0 |
ruby-lang | ruby | 2.4.0:preview1 |
ruby-lang | ruby | 2.4.0:preview2 |
ruby-lang | ruby | 2.4.0:preview3 |
ruby-lang | ruby | 2.4.0:rc1 |
ruby-lang | ruby | 2.4.1 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.10 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_eus | 7.4 |
redhat | enterprise_linux_server_eus | 7.5 |
redhat | enterprise_linux_server_eus | 7.6 |
redhat | enterprise_linux_server_tus | 7.4 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References