Ubuntu alert USN-1583-1 (ruby1.9.1)
From: | Tyler Hicks <tyhicks@canonical.com> | |
To: | ubuntu-security-announce@lists.ubuntu.com | |
Subject: | [USN-1583-1] Ruby vulnerabilities | |
Date: | Tue, 25 Sep 2012 19:33:16 -0700 | |
Message-ID: | <20120926023316.GD4742@boyd> |
========================================================================== Ubuntu Security Notice USN-1583-1 September 26, 2012 ruby1.9.1 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 12.04 LTS Summary: Several security issues were fixed in ruby1.9.1 Software Description: - ruby1.9.1: Interpreter of object-oriented scripting language Ruby Details: It was discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions. (CVE-2011-1005) John Firebaugh discovered that the RubyGems remote gem fetcher did not properly verify SSL certificates. A remote attacker could exploit this to perform a man in the middle attack to alter gem files being downloaded for installation. (CVE-2012-2126) John Firebaugh discovered that the RubyGems remote gem fetcher allowed redirection from HTTPS to HTTP. A remote attacker could exploit this to perform a man in the middle attack to alter gem files being downloaded for installation. (CVE-2012-2125) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 12.04 LTS: libruby1.9.1 1.9.3.0-1ubuntu2.2 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1583-1 CVE-2011-1005, CVE-2012-2125, CVE-2012-2126 Package Information: https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.0-1u... -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...