Upstream information
Description
The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 5 | 
| Vector | AV:N/AC:L/Au:N/C:N/I:P/A:N | 
| Access Vector | Network | 
| Access Complexity | Low | 
| Authentication | None | 
| Confidentiality Impact | None | 
| Integrity Impact | Partial | 
| Availability Impact | None | 
SUSE Security Advisories:
- SUSE-SU-2013:0435-1, published Tue Mar 12 11:04:49 MDT 2013
 - SUSE-SU-2013:0611-1, published Wed Apr 3 12:09:44 MDT 2013 openSUSE-SU-2013:0376-1
 
List of released packages
| Product(s) | Fixed package version(s) | References | 
|---|---|---|
| SUSE Linux Enterprise Desktop 11 SP2 | 
  |  Patchnames:  sdksp2-ruby sledsp2-ruby  | 
| SUSE Linux Enterprise Server 11 SP2 SUSE Linux Enterprise Server for SAP Applications 11 SP2  |  
  |  Patchnames:  sdksp2-ruby slessp2-ruby  | 
| SUSE Linux Enterprise Software Development Kit 11 SP2 | 
  |  Patchnames:  sdksp2-ruby  | 
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 08:57:50 2013CVE page last modified: Mon Oct 6 18:18:15 2025