Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 199545 - CVE-2006-3694 ruby safe-level bypass
CVE-2006-3694 ruby safe-level bypass
Product: Red Hat Enterprise Linux 4
Classification: Red Hat
Component: ruby (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Akira TAGOH
Bill Huang
: Security
Depends On: 199543
  Show dependency treegraph
Reported: 2006-07-20 05:49 EDT by Akira TAGOH
Modified: 2007-11-30 17:07 EST (History)
1 user (show)

See Also:
Fixed In Version: RHSA-2006-0604
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2006-07-27 16:33:49 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2006:0604 normal SHIPPED_LIVE Moderate: ruby security update 2006-07-27 00:00:00 EDT

  None (edit)
Description Akira TAGOH 2006-07-20 05:49:15 EDT
+++ This bug was initially created as a clone of Bug #199543 +++

Description of problem:
A Vulneerability has been reported in Ruby, which can be exploited by malicious
people to bypass certain security-level restrictions.

Version-Release number of selected component (if applicable):
all versions of Ruby, such as 1.6.x and 1.8.x without any exceptions.

How reproducible:

Steps to Reproduce:
1.ruby alias_jvn83768862.patch
Actual results:
no exceptions.

Expected results:
$ ruby alias_jvn83768862.patch
alias_jvn83768862.patch:9:in `p': calling insecure method: inspect (SecurityError)
        from alias_jvn83768862.patch:9

Additional info:
thia affects to RHEL2.1, 3 and 4 as well.

-- Additional comment from tagoh@redhat.com on 2006-07-20 05:47 EST --
Created an attachment (id=132736)
Comment 1 Akira TAGOH 2006-07-21 08:47:56 EDT
Fixed packages has been built.
Comment 5 Red Hat Bugzilla 2006-07-27 16:33:50 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.