-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security/ http://www.openpkg.org openpkg-security@openpkg.org openpkg@openpkg.org OpenPKG-SA-2006.016 28-Jul-2006 ________________________________________________________________________ Package: ruby Vulnerability: unspecified OpenPKG Specific: no Affected Releases: Affected Packages: Corrected Packages: OpenPKG CURRENT <= ruby-1.8.4-20051225 >= ruby-1.8.4-20060728 OpenPKG 2-STABLE <= ruby-1.8.4-2.20060622 >= ruby-1.8.4-2.20060728 OpenPKG 2.5-RELEASE <= ruby-1.8.3-2.5.0 >= ruby-1.8.3-2.5.1 Description: Multiple unspecified vulnerabilities in the Ruby [1] programming language allow remote attackers to bypass "safe level" checks via unspecified vectors involving the "alias" function, directory operations and regular expressions. The Common Vulnerabilities and Exposures (CVE) project assigned the id CVE-2006-3694 [2] to the problem. ________________________________________________________________________ References: [1] http://www.ruby-lang.org/ [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3694 ________________________________________________________________________ For security reasons, this advisory was digitally signed with the OpenPGP public key "OpenPKG " (ID 63C4CB9F) of the OpenPKG project which you can retrieve from http://pgp.openpkg.org and hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org for details on how to verify the integrity of this advisory. ________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Comment: OpenPKG iD8DBQFEye69gHWT4GPEy58RAlmgAJ9P8zeezBNr1xP9386nwqOorWmqXQCg399h 4hF/HhtXEwInVpUubs57GcQ= =Lq1J -----END PGP SIGNATURE-----