[Secure-testing-team] Bug#564647: ruby1.9: WEBrick control characters vulnerability

Daigo Moriwaki daigo at debian.org
Mon Jan 11 00:20:31 UTC 2010


Package: ruby1.9
Severity: grave
Tags: security
Justification: user security hole

The upstream has released a vulnerability fix in WEBrick, a part of Ruby's
standard library.  WEBrick lets attackers to inject malicious escap
e sequences to its logs, making it possible for dangerous control characters
to be executed on a victim's terminal emulator.

-- System Information:
Debian Release: squeeze/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'stable'), (90, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.30-2-amd64 (SMP w/2 CPU cores)
Locale: LANG=ja_JP.eucJP, LC_CTYPE=ja_JP.eucJP (charmap=EUC-JP)
Shell: /bin/sh linked to /bin/dash

Versions of packages ruby1.9 depends on:
ii  libc6                        2.10.2-2    GNU C Library: Shared libraries
ii  libruby1.9.1                 1.9.1.376-1 Libraries necessary to run Ruby 1.

ruby1.9 recommends no packages.

Versions of packages ruby1.9 suggests:
pn  rdoc1.9                       <none>     (no description available)
pn  ri1.9                         <none>     (no description available)
pn  ruby1.9-examples              <none>     (no description available)
pn  rubygems1.9                   <none>     (no description available)





More information about the Secure-testing-team mailing list