USN-1733-1: Ruby vulnerabilities

21 February 2013

ruby1.9.1 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.10
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in Ruby.

Software Description

  • ruby1.9.1 - Interpreter of object-oriented scripting language Ruby

Details

Jean-Philippe Aumasson discovered that Ruby incorrectly generated predictable hash values. An attacker could use this issue to generate hash collisions and cause a denial of service. (CVE-2012-5371)

Evgeny Ermakov discovered that documentation generated by rdoc is vulnerable to a cross-site scripting issue. With cross-site scripting vulnerabilities, if a user were tricked into viewing a specially crafted page, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain. (CVE-2013-0256)

Thomas Hollstegge and Ben Murphy discovered that the JSON implementation in Ruby incorrectly handled certain crafted documents. An attacker could use this issue to cause a denial of service or bypass certain protection mechanisms. (CVE-2013-0269)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.10
libruby1.9.1 - 1.9.3.194-1ubuntu1.3
ruby1.9.1 - 1.9.3.194-1ubuntu1.3
Ubuntu 12.04 LTS
libruby1.9.1 - 1.9.3.0-1ubuntu2.5
ruby1.9.1 - 1.9.3.0-1ubuntu2.5

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References