[USN-1733-1] Ruby vulnerabilities

Type securityvulns
Reporter Securityvulns
Modified 2013-02-24T00:00:00


========================================================================== Ubuntu Security Notice USN-1733-1 February 21, 2013

ruby1.9.1 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.10
  • Ubuntu 12.04 LTS


Several security issues were fixed in Ruby.

Software Description: - ruby1.9.1: Interpreter of object-oriented scripting language Ruby


Jean-Philippe Aumasson discovered that Ruby incorrectly generated predictable hash values. An attacker could use this issue to generate hash collisions and cause a denial of service. (CVE-2012-5371)

Evgeny Ermakov discovered that documentation generated by rdoc is vulnerable to a cross-site scripting issue. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2013-0256)

Thomas Hollstegge and Ben Murphy discovered that the JSON implementation in Ruby incorrectly handled certain crafted documents. An attacker could use this issue to cause a denial of service or bypass certain protection mechanisms. (CVE-2013-0269)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.10: libruby1.9.1 ruby1.9.1

Ubuntu 12.04 LTS: libruby1.9.1 ruby1.9.1

In general, a standard system update will make all the necessary changes.

References: http://www.ubuntu.com/usn/usn-1733-1 CVE-2012-5371, CVE-2013-0256, CVE-2013-0269

Package Information: https://launchpad.net/ubuntu/+source/ruby1.9.1/ https://launchpad.net/ubuntu/+source/ruby1.9.1/

-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce