tag 689075 + pending
thanks

Hello Tyler,

Tyler Hicks escreveu:
> Package: ruby1.9.1
> Version: 1.9.3.194-1
> Severity: grave
> Tags: patch security
> Justification: user security hole
> User: ubuntu-de...@lists.ubuntu.com
> Usertags: origin-ubuntu quantal ubuntu-patch
> 
> Dear Maintainer,
> 
> While running some regression tests I discovered that 1.9.3.194-1 is
> vulnerable to CVE-2011-1005, despite the Ruby advisory stating
> otherwise:
> 
> http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/
> 
> You can use the reproducer in the advisory for verification. Just do a
> 'puts $secret_path' rather than the 'open($secret_path)' block.
> 
> In Ubuntu, the attached patch was applied to achieve the following:
> 
>   * SECURITY UPDATE: Safe level bypass
>     - debian/patches/20120927-cve_2011_1005.patch: Remove incorrect string
>       taint in exception handling methods. Based on upstream patch.
>     - CVE-2011-1005

Thanks for submitting this. Did you notify upstream of the fact that the
1.9 series is actually affected by this issue?

-- 
Antonio Terceiro <terce...@debian.org>

Attachment: signature.asc
Description: Digital signature

Reply via email to