Lucene search

K
centosCentOS ProjectCESA-2005:799
HistoryOct 11, 2005 - 5:07 p.m.

irb, ruby security update

2005-10-1117:07:31
CentOS Project
lists.centos.org
42

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.016 Low

EPSS

Percentile

87.3%

CentOS Errata and Security Advisory CESA-2005:799

Ruby is an interpreted scripting language for object-oriented programming.

A bug was found in the way ruby handles eval statements. It is possible for
a malicious script to call eval in such a way that can allow the bypass of
certain safe-level restrictions. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2005-2337 to this issue.

Users of Ruby should update to these erratum packages, which contain a
backported patch and are not vulnerable to this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-October/074424.html
https://lists.centos.org/pipermail/centos-announce/2005-October/074427.html
https://lists.centos.org/pipermail/centos-announce/2005-October/074433.html
https://lists.centos.org/pipermail/centos-announce/2005-October/074434.html
https://lists.centos.org/pipermail/centos-announce/2005-October/074439.html
https://lists.centos.org/pipermail/centos-announce/2005-October/074446.html

Affected packages:
irb
ruby
ruby-devel
ruby-docs
ruby-libs
ruby-mode
ruby-tcltk

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:799

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.016 Low

EPSS

Percentile

87.3%