First published: Wed Oct 03 2012(Updated: )
Originally, Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2011-1005">CVE-2011-1005</a> to the following vulnerability: The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname. Later it was reported: [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689075">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689075</a> [2] <a href="http://www.openwall.com/lists/oss-security/2012/10/02/4">http://www.openwall.com/lists/oss-security/2012/10/02/4</a> that upstream ruby 1.9.1 and ruby 1.9.3 versions are also vulnerable to this flaw. Relevant upstream patch: [3] <a href="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ruby | <1.9.3 | 1.9.3 |
Ruby | =1.9.3 | |
Ruby | =1.9.3-p0 | |
Ruby | =1.9.3-p125 | |
Ruby | =1.9.3-p194 | |
Ruby | =2.0 | |
Ruby | =2.0.0 | |
Ruby | =2.0.0-p0 | |
Ruby | =2.0.0-preview1 | |
Ruby | =2.0.0-preview2 | |
Ruby | =2.0.0-rc1 | |
Ruby | =2.0.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.