Package: ruby1.9 Severity: grave Tags: security Justification: user security hole
The upstream has released a vulnerability fix in WEBrick, a part of Ruby's standard library. WEBrick lets attackers to inject malicious escap e sequences to its logs, making it possible for dangerous control characters to be executed on a victim's terminal emulator. -- System Information: Debian Release: squeeze/sid APT prefers testing APT policy: (990, 'testing'), (500, 'stable'), (90, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 2.6.30-2-amd64 (SMP w/2 CPU cores) Locale: LANG=ja_JP.eucJP, LC_CTYPE=ja_JP.eucJP (charmap=EUC-JP) Shell: /bin/sh linked to /bin/dash Versions of packages ruby1.9 depends on: ii libc6 2.10.2-2 GNU C Library: Shared libraries ii libruby1.9.1 1.9.1.376-1 Libraries necessary to run Ruby 1. ruby1.9 recommends no packages. Versions of packages ruby1.9 suggests: pn rdoc1.9 <none> (no description available) pn ri1.9 <none> (no description available) pn ruby1.9-examples <none> (no description available) pn rubygems1.9 <none> (no description available) -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org