USN-1733-1: Ruby vulnerabilities

Ubuntu Security Notice USN-1733-1

21st February, 2013

ruby1.9.1 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.10
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in Ruby.

Software description

  • ruby1.9.1 - Interpreter of object-oriented scripting language Ruby

Details

Jean-Philippe Aumasson discovered that Ruby incorrectly generated
predictable hash values. An attacker could use this issue to generate hash
collisions and cause a denial of service. (CVE-2012-5371)

Evgeny Ermakov discovered that documentation generated by rdoc is
vulnerable to a cross-site scripting issue. With cross-site scripting
vulnerabilities, if a user were tricked into viewing a specially crafted
page, a remote attacker could exploit this to modify the contents, or steal
confidential data, within the same domain. (CVE-2013-0256)

Thomas Hollstegge and Ben Murphy discovered that the JSON implementation
in Ruby incorrectly handled certain crafted documents. An attacker could
use this issue to cause a denial of service or bypass certain protection
mechanisms. (CVE-2013-0269)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 12.10:
ruby1.9.1 1.9.3.194-1ubuntu1.3
libruby1.9.1 1.9.3.194-1ubuntu1.3
Ubuntu 12.04 LTS:
ruby1.9.1 1.9.3.0-1ubuntu2.5
libruby1.9.1 1.9.3.0-1ubuntu2.5

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2012-5371, CVE-2013-0256, CVE-2013-0269