GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Oct 07, 2005 5:25 pm Post subject: [ GLSA 200510-05 ] Ruby: Security bypass vulnerability |
|
|
Gentoo Linux Security Advisory
Title: Ruby: Security bypass vulnerability (GLSA 200510-05)
Severity: normal
Exploitable: remote
Date: October 06, 2005
Bug(s): #106996
ID: 200510-05
Synopsis
Ruby is vulnerable to a security bypass of the safe level mechanism.
Background
Ruby is an interpreted scripting language for quick and easy object-oriented programming. Ruby supports the safe execution of untrusted code using a safe level and taint flag mechanism.
Affected Packages
Package: dev-lang/ruby
Vulnerable: < 1.8.3
Unaffected: >= 1.8.3
Architectures: All supported architectures
Description
Dr. Yutaka Oiwa discovered that Ruby fails to properly enforce safe level protections.
Impact
An attacker could exploit this vulnerability to execute arbitrary code beyond the restrictions specified in each safe level.
Workaround
There is no known workaround at this time.
Resolution
All Ruby users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.3" |
References
CAN-2005-2337
Ruby release announcement
Last edited by GLSA on Sun May 07, 2006 4:59 pm; edited 1 time in total |
|