From 47da37b0a0e57bbf3574f2dc8e27c435437b6e4e Mon Sep 17 00:00:00 2001 From: zzak Date: Tue, 5 Feb 2013 01:14:52 +0000 Subject: * doc/security.rdoc: Grammatical error on security guide Patch by Josh Bassett [Github fixes #245] git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@39053 b2dd03c8-39d4-4d8f-98ff-823fe69b080e --- ChangeLog | 5 +++++ doc/security.rdoc | 2 +- 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/ChangeLog b/ChangeLog index 36431936fb..84b2ac7007 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,8 @@ +Tue Feb 5 10:15:00 2013 Zachary Scott + + * doc/security.rdoc: Grammatical error on security guide + Patch by Josh Bassett [Github fixes #245] + Tue Feb 5 10:00:00 2013 Zachary Scott * lib/racc/parser.rb: Update #do_parse and #yyparse from upstream diff --git a/doc/security.rdoc b/doc/security.rdoc index 32273c8a97..9f0ec5cd02 100644 --- a/doc/security.rdoc +++ b/doc/security.rdoc @@ -18,7 +18,7 @@ Ruby's +Marshal+ module provides methods for serializing and deserializing Ruby Never use +Marshal.load+ to deserialize untrusted or user supplied data. Because +Marshal+ can deserialize to almost any Ruby object and has full control over instance variables, it is possible to craft a malicious payload that executes code shortly after deserialization. -If you need to deserialize untrusted data, you should use JSON as it is only capable of returning 'primitive' types such as strings, arrays, hashes, numbers and nil. If you need to deserialize other classes, you should do handle this manually. Never deserialize to a user specified class. +If you need to deserialize untrusted data, you should use JSON as it is only capable of returning 'primitive' types such as strings, arrays, hashes, numbers and nil. If you need to deserialize other classes, you should handle this manually. Never deserialize to a user specified class. == +YAML+ -- cgit v1.2.3