Moderate CentOS ruby Update

Metadata

medium
5.0
ruby-1.8.5-27.el5.i386.rpm, ruby-1.8.5-27.el5.src.rpm, ruby-1.8.5-27.el5.x86_64.rpm, ruby-devel-1.8.5-27.el5.i386.rpm, ruby-devel-1.8.5-27.el5.x86_64.rpm, ruby-docs-1.8.5-27.el5.i386.rpm, ruby-docs-1.8.5-27.el5.x86_64.rpm, ruby-irb-1.8.5-27.el5.i386.rpm, ruby-irb-1.8.5-27.el5.x86_64.rpm, ruby-libs-1.8.5-27.el5.i386.rpm, ruby-libs-1.8.5-27.el5.x86_64.rpm, ruby-mode-1.8.5-27.el5.i386.rpm, ruby-mode-1.8.5-27.el5.x86_64.rpm, ruby-rdoc-1.8.5-27.el5.i386.rpm, ruby-rdoc-1.8.5-27.el5.x86_64.rpm, ruby-ri-1.8.5-27.el5.i386.rpm, ruby-ri-1.8.5-27.el5.x86_64.rpm, ruby-tcltk-1.8.5-27.el5.i386.rpm, ruby-tcltk-1.8.5-27.el5.x86_64.rpm
CVE-2012-4481, CVE-2012-4522
rhn.redhat.com, lists.centos.org, lists.centos.org
2013-01-09
2017-07-27 19:04
ALAS-2013-173
Moderate CentOS ruby Update
CVE-2012-4522 ruby1.9.1
CVE-2012-4522 ruby1.8
CVE-2012-4481 ruby1.8
CVE-2012-4522
CVE-2012-4481
2017-04-01 19:06
2017-01-05 20:10

Description


Updated ruby packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Ruby is an extensible, interpreted, object-oriented, scripting language. It
has features to process text files and to do system management tasks.

It was found that certain methods did not sanitize file names before
passing them to lower layer routines in Ruby. If a Ruby application created
files with names based on untrusted input, it could result in the creation
of files with different names than expected. (CVE-2012-4522)

It was found that the RHSA-2011:0909 update did not correctly fix the
CVE-2011-1005 issue, a flaw in the method for translating an exception
message into a string in the Exception class. A remote attacker could use
this flaw to bypass safe level 4 restrictions, allowing untrusted (tainted)
code to modify arbitrary, trusted (untainted) strings, which safe level 4
restrictions would otherwise prevent. (CVE-2012-4481)

The CVE-2012-4481 issue was discovered by Vit Ondruch of Red Hat.

This update also fixes the following bug:

* Prior to this update, the "rb_syck_mktime" option could, under certain
circumstances, terminate with a segmentation fault when installing
libraries with certain gems. This update modifies the underlying code so
that Ruby gems can be installed as expected. (BZ#834381)

All users of Ruby are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
5 ruby ruby-1.8.5-27.el5.i386.rpm
ruby ruby-1.8.5-27.el5.src.rpm
ruby ruby-1.8.5-27.el5.x86_64.rpm
ruby-devel ruby-devel-1.8.5-27.el5.i386.rpm
ruby-devel ruby-devel-1.8.5-27.el5.x86_64.rpm
ruby-docs ruby-docs-1.8.5-27.el5.i386.rpm
ruby-docs ruby-docs-1.8.5-27.el5.x86_64.rpm
ruby-irb ruby-irb-1.8.5-27.el5.i386.rpm
ruby-irb ruby-irb-1.8.5-27.el5.x86_64.rpm
ruby-libs ruby-libs-1.8.5-27.el5.i386.rpm
ruby-libs ruby-libs-1.8.5-27.el5.x86_64.rpm
ruby-mode ruby-mode-1.8.5-27.el5.i386.rpm
ruby-mode ruby-mode-1.8.5-27.el5.x86_64.rpm
ruby-rdoc ruby-rdoc-1.8.5-27.el5.i386.rpm
ruby-rdoc ruby-rdoc-1.8.5-27.el5.x86_64.rpm
ruby-ri ruby-ri-1.8.5-27.el5.i386.rpm
ruby-ri ruby-ri-1.8.5-27.el5.x86_64.rpm
ruby-tcltk ruby-tcltk-1.8.5-27.el5.i386.rpm
ruby-tcltk ruby-tcltk-1.8.5-27.el5.x86_64.rpm