USN-195-1: Ruby vulnerability
10 October 2005
Ruby vulnerability
Releases
Details
The object oriented scripting language Ruby supports safely executing
untrusted code with two mechanisms: safe level and taint flag on
objects. Dr. Yutaka Oiwa discovered a vulnerability that allows
Ruby methods to bypass these mechanisms. In systems which use this
feature, this could be exploited to execute Ruby code beyond the
restrictions specified in each safe level.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 5.04
-
ruby1.8
-
Ubuntu 4.10
-
ruby1.8
-
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-196-1: libxine1