CVE-2012-4522

Priority
Medium
Description
The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel
286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to
create files in unexpected locations or with unexpected names via a NUL
byte in a file path.
References
Notes
sarnold> open("foo\0bar", "w") { |f| f.puts "hai" } # look for 'foo'
Assigned-to
tyhicks
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):ignored (reached end-of-life)
Ubuntu 10.04 LTS (Lucid Lynx):not-affected (1.8.7.249-2ubuntu0.2 tested)
Ubuntu 11.10 (Oneiric Ocelot):not-affected (1.8.7.352-2ubuntu0.2 tested)
Ubuntu 12.04 LTS (Precise Pangolin):not-affected (1.8.7.352-2ubuntu1.1 tested)
Ubuntu 12.10 (Quantal Quetzal):not-affected (1.8.7.358-4 tested)
Ubuntu 13.04 (Raring Ringtail):not-affected (1.8.7.358-4 tested)
Package
Upstream:released (1.9.3 patchlevel 286)
Ubuntu 8.04 LTS (Hardy Heron):ignored (reached end-of-life)
Ubuntu 10.04 LTS (Lucid Lynx):not-affected (1.9.0.5-1ubuntu2 tested)
Ubuntu 11.10 (Oneiric Ocelot):DNE
Ubuntu 12.04 LTS (Precise Pangolin):DNE
Ubuntu 12.10 (Quantal Quetzal):DNE
Ubuntu 13.04 (Raring Ringtail):DNE
Package
Upstream:released (1.9.3 patchlevel 286)
Ubuntu 8.04 LTS (Hardy Heron):DNE
Ubuntu 10.04 LTS (Lucid Lynx):not-affected (1.9.1.378-1 tested)
Ubuntu 11.10 (Oneiric Ocelot):not-affected (1.9.2.290-2 tested)
Ubuntu 12.04 LTS (Precise Pangolin):released (1.9.3.0-1ubuntu2.4)
Ubuntu 12.10 (Quantal Quetzal):released (1.9.3.194-1ubuntu1.2)
Ubuntu 13.04 (Raring Ringtail):released (1.9.3.194-1ubuntu1.2)
Patches:
Upstream:http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37164 (1.9.3 branch)
More Information

Valid XHTML 1.0 Strict

Updated: 2012-11-29 02:14:40 UTC (commit 6103)