Date: Tue, 15 Jul 2008 15:57:00 -0500 Reply-To: Troy DawsonSender: Security Errata for Scientific Linux From: Troy Dawson Subject: Security ERRATA for ruby on SL3.x i386/x86_64 Comments: To: "scientific-linux-errata@fnal.gov" Synopsis: Moderate: ruby security update Issue date: 2008-07-14 CVE Names: CVE-2008-2663 CVE-2008-2664 CVE-2008-2725 CVE-2008-2726 CVE-2006-6303 CVE-2008-2376 Multiple integer overflows leading to a heap overflow were discovered in the array- and string-handling code used by Ruby. An attacker could use these flaws to crash a Ruby application or, possibly, execute arbitrary code with the privileges of the Ruby application using untrusted inputs in array or string operations. (CVE-2008-2376, CVE-2008-2663, CVE-2008-2725, CVE-2008-2726) It was discovered that Ruby used the alloca() memory allocation function in the format (%) method of the String class without properly restricting maximum string length. An attacker could use this flaw to crash a Ruby application or, possibly, execute arbitrary code with the privileges of the Ruby application using long, untrusted strings as format strings. (CVE-2008-2664) A flaw was discovered in the way Ruby's CGI module handles certain HTTP requests. A remote attacker could send a specially crafted request and cause the Ruby CGI script to enter an infinite loop, possibly causing a denial of service. (CVE-2006-6303) SL 3.0.x SRPMS: ruby-1.6.8-12.el3.src.rpm i386: ruby-1.6.8-12.el3.i386.rpm ruby-devel-1.6.8-12.el3.i386.rpm ruby-docs-1.6.8-12.el3.i386.rpm ruby-libs-1.6.8-12.el3.i386.rpm ruby-mode-1.6.8-12.el3.i386.rpm ruby-tcltk-1.6.8-12.el3.i386.rpm irb-1.6.8-12.el3.i386.rpm x86_64: ruby-1.6.8-12.el3.x86_64.rpm ruby-devel-1.6.8-12.el3.x86_64.rpm ruby-docs-1.6.8-12.el3.x86_64.rpm ruby-libs-1.6.8-12.el3.i386.rpm ruby-libs-1.6.8-12.el3.x86_64.rpm ruby-mode-1.6.8-12.el3.x86_64.rpm ruby-tcltk-1.6.8-12.el3.x86_64.rpm irb-1.6.8-12.el3.x86_64.rpm -Connie Sieh -Troy Dawson