Ruby: Security bypass vulnerability Ruby is vulnerable to a security bypass of the safe level mechanism. ruby 2005-10-06 2005-10-06 106996 remote 1.8.3 1.8.3

Ruby is an interpreted scripting language for quick and easy object-oriented programming. Ruby supports the safe execution of untrusted code using a safe level and taint flag mechanism.

Dr. Yutaka Oiwa discovered that Ruby fails to properly enforce safe level protections.

An attacker could exploit this vulnerability to execute arbitrary code beyond the restrictions specified in each safe level.

There is no known workaround at this time.

All Ruby users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.3"
CAN-2005-2337 Ruby release announcement koon koon jaervosz