Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 21 Feb 2011 14:52:50 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE request: ruby: FileUtils is vulnerable to
 symlink race attacks + Exception methods can bypass $SAFE



----- Original Message -----
> AFAIK this two need a CVE-ID:
> 1)
> http://www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/

CVE-2011-1004 Ruby FileUtils.remove_entry_secure symlink attack


> 2)
> http://www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/
> 

CVE-2011-1005 Ruby Exception methods can bypass $SAFE

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.