First published: Sun Feb 20 2011(Updated: )
A security flaw was found in the Ruby method, translating message of the exception into string representation. An attacker could use this flaw to modify arbitrary untainted strings into their tainted equivalents by tricking the safe level mechanism of this method. References: [1] <a href="http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/">http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/</a> Upstream patch (against ruby_1_8 branch): [2] <a href="http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=30903">http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=30903</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | =1.8.6-420 | |
Ruby-lang Ruby | =1.8.7-330 | |
Ruby-lang Ruby | =1.8.7 | |
Ruby-lang Ruby | =1.8.8-dev | |
Ruby-lang Ruby | =1.8.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.