Summary: | <dev-lang/ruby-1.9.3_p429 : DL and Fiddle Tained Object Handling Vulnerability (CVE-2013-2065) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | ruby |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/53432/ | ||
Whiteboard: | B4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() I've just added ruby 1.9.3 p492. Given that there are also other bug fixes and changes, I would suggest to hold off stabilization for a few days to see if any issues surface. I haven't seen any regressions, so let's go ahead and mark this version stable. =dev-lang/ruby-1.9.3_p429 Arches, please test and mark stable: =dev-lang/ruby-1.9.3_p429 Target keywords : "alpha amd64 arm hppa ia64 ppc ppc64 s390 sh sparc x86" Stable for HPPA. amd64 stable x86 stable ppc stable arm stable sparc stable alpha stable ia64 stable ppc64 stable s390 stable sh stable GLSA vote: no. CVE-2013-2065 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2065): (1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions. GLSA vote: no. Closing as [noglsa] |