Bug 862614 (CVE-2012-4466) - CVE-2012-4466 ruby: safe level bypass via name_err_mesg_to_str()
Summary: CVE-2012-4466 ruby: safe level bypass via name_err_mesg_to_str()
Alias: CVE-2012-4466
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
: 862906 (view as bug list)
Depends On: 839530 862907 863315 904021
Blocks: 767033 862631
TreeView+ depends on / blocked
Reported: 2012-10-03 11:47 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:55 UTC (History)
10 users (show)

Fixed In Version: ruby 1.9.3p286, ruby 1.8.7p371
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2014-09-06 00:49:44 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2013:0582 0 normal SHIPPED_LIVE Moderate: Red Hat OpenShift Enterprise 1.1.1 update 2013-03-01 00:05:18 UTC

Description Jan Lieskovsky 2012-10-03 11:47:46 UTC
Originally, Common Vulnerabilities and Exposures assigned an identifier CVE-2011-1005 to the following vulnerability:

The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.

Later it was reported:
[1] http://www.openwall.com/lists/oss-security/2012/10/02/4

that the Ruby name_err_mesg_to_str() method is vulnerable to the similar flaw.

Relevant upstream patch:
[2] http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068

Comment 2 Vincent Danen 2012-10-03 20:57:38 UTC
*** Bug 862906 has been marked as a duplicate of this bug. ***

Comment 3 Vincent Danen 2012-10-03 21:03:24 UTC
Created ruby tracking bugs for this issue

Affects: fedora-all [bug 862907]

Comment 9 errata-xmlrpc 2013-02-28 19:08:18 UTC
This issue has been addressed in following products:

  RHEL 6 Version of OpenShift Enterprise

Via RHSA-2013:0582 https://rhn.redhat.com/errata/RHSA-2013-0582.html

Note You need to log in before you can comment on or make changes to this bug.