USN-371-1: Ruby vulnerability

Publication date

1 November 2006

Overview

Ruby vulnerability


Details

An error was found in Ruby’s CGI library that did not correctly check
for the end of multipart MIME requests. Using a crafted HTTP request, a
remote user could cause a denial of service, where Ruby CGI applications
would end up in a loop, monopolizing a CPU.

An error was found in Ruby’s CGI library that did not correctly check
for the end of multipart MIME requests. Using a crafted HTTP request, a
remote user could cause a denial of service, where Ruby CGI applications
would end up in a loop, monopolizing a CPU.

Update instructions

In general, a standard system upgrade is sufficient to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
6.10 edgy libruby1.8 –  1.8.4-5ubuntu1.1
6.06 dapper libruby1.8 –  1.8.4-1ubuntu1.2
5.10 breezy libruby1.8 –  1.8.2-9ubuntu1.3
5.04 hoary libruby1.8 –  1.8.1+1.8.2pre4-1ubuntu0.5

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›