[USN-1583-1] Ruby vulnerabilities
Tyler Hicks
tyhicks at canonical.com
Wed Sep 26 02:33:16 UTC 2012
==========================================================================
Ubuntu Security Notice USN-1583-1
September 26, 2012
ruby1.9.1 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in ruby1.9.1
Software Description:
- ruby1.9.1: Interpreter of object-oriented scripting language Ruby
Details:
It was discovered that Ruby incorrectly allowed untainted strings to be
modified in protective safe levels. An attacker could use this flaw to bypass
intended access restrictions. (CVE-2011-1005)
John Firebaugh discovered that the RubyGems remote gem fetcher did not properly
verify SSL certificates. A remote attacker could exploit this to perform a man
in the middle attack to alter gem files being downloaded for installation.
(CVE-2012-2126)
John Firebaugh discovered that the RubyGems remote gem fetcher allowed
redirection from HTTPS to HTTP. A remote attacker could exploit this to perform
a man in the middle attack to alter gem files being downloaded for
installation. (CVE-2012-2125)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.04 LTS:
libruby1.9.1 1.9.3.0-1ubuntu2.2
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1583-1
CVE-2011-1005, CVE-2012-2125, CVE-2012-2126
Package Information:
https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.0-1ubuntu2.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20120925/cc225c92/attachment.sig>
More information about the ubuntu-security-announce
mailing list