User: Password:
|
|
Subscribe / Log in / New account

Fedora alert FEDORA-2008-8738 (ruby)

From:  updates@fedoraproject.org
To:  fedora-package-announce@redhat.com
Subject:  [SECURITY] Fedora 9 Update: ruby-1.8.6.287-2.fc9
Date:  Thu, 09 Oct 2008 21:29:45 +0000
Message-ID:  <20081009212945.44ED1208741@bastion.fedora.phx.redhat.com>

-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2008-8738 2008-10-09 04:46:11 -------------------------------------------------------------------------------- Name : ruby Product : Fedora 9 Version : 1.8.6.287 Release : 2.fc9 URL : http://www.ruby-lang.org/ Summary : An interpreter of object-oriented scripting language Description : Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible. -------------------------------------------------------------------------------- Update Information: Update to new upstream release fixing multiple security issues detailed in the upstream advisories: http://www.ruby-lang.org/en/news/2008/08/08/multiple- vulnerabilities-in-ruby/ - CVE-2008-3655 - multiple insufficient safe mode restrictions - CVE-2008-3656 - WEBrick DoS vulnerability (CPU consumption) - CVE-2008-3657 - missing "taintness" checks in dl module - CVE-2008-3905 - resolv.rb adds random transactions ids and source ports to prevent DNS spoofing attacks http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerabi... rexml/ - CVE-2008-3790 - DoS in the REXML module One issue not covered by any upstream advisory: - CVE-2008-3443 - DoS in the regular expression engine -------------------------------------------------------------------------------- ChangeLog: * Wed Oct 8 2008 Akira TAGOH <tagoh@redhat.com> - 1.8.6.287-2 - CVE-2008-3790: DoS vulnerability in the REXML module. * Sat Aug 23 2008 Akira TAGOH <tagoh@redhat.com> - 1.8.6.287-1 - New upstream release. - Security fixes. - CVE-2008-3655: Ruby does not properly restrict access to critical variables and methods at various safe levels. - CVE-2008-3656: DoS vulnerability in WEBrick. - CVE-2008-3657: Lack of taintness check in dl. - CVE-2008-1447: DNS spoofing vulnerability in resolv.rb. - CVE-2008-3443: Memory allocation failure in Ruby regex engine. - Remove the unnecessary backported patches. * Tue Jul 1 2008 Akira TAGOH <tagoh@redhat.com> - 1.8.6.230-4 - Backported from upstream SVN to fix a segfault issue with Array#fill. * Mon Jun 30 2008 Akira TAGOH <tagoh@redhat.com> - 1.8.6.230-3 - Backported from upstream SVN to fix a segfault issue. (#452825) - Backported from upstream SVN to fix an integer overflow in rb_ary_fill. * Wed Jun 25 2008 Akira TAGOH <tagoh@redhat.com> - 1.8.6.230-2 - Fix a segfault issue. (#452809) * Tue Jun 24 2008 Akira TAGOH <tagoh@redhat.com> - 1.8.6.230-1 - New upstream release. - Security fixes. (#452294). - CVE-2008-1891: WEBrick CGI source disclosure. - CVE-2008-2662: Integer overflow in rb_str_buf_append(). - CVE-2008-2663: Integer overflow in rb_ary_store(). - CVE-2008-2664: Unsafe use of alloca in rb_str_format(). - CVE-2008-2725: Integer overflow in rb_ary_splice(). - CVE-2008-2726: Integer overflow in rb_ary_splice(). - ruby-1.8.6.111-CVE-2007-5162.patch: removed. -------------------------------------------------------------------------------- References: [ 1 ] Bug #458948 - CVE-2008-3655 ruby: multiple insufficient safe mode restrictions https://bugzilla.redhat.com/show_bug.cgi?id=458948 [ 2 ] Bug #458966 - CVE-2008-3657 ruby: missing "taintness" checks in dl module https://bugzilla.redhat.com/show_bug.cgi?id=458966 [ 3 ] Bug #459266 - CVE-2008-3443 ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS) https://bugzilla.redhat.com/show_bug.cgi?id=459266 [ 4 ] Bug #458953 - CVE-2008-3656 ruby: WEBrick DoS vulnerability (CPU consumption) https://bugzilla.redhat.com/show_bug.cgi?id=458953 [ 5 ] Bug #449345 - CVE-2008-1447 implement source UDP port randomization (CERT VU#800113) https://bugzilla.redhat.com/show_bug.cgi?id=449345 [ 6 ] Bug #460134 - CVE-2008-3790 ruby: DoS vulnerability in the REXML module https://bugzilla.redhat.com/show_bug.cgi?id=460134 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update ruby' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at http://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ Fedora-package-announce mailing list Fedora-package-announce@redhat.com http://www.redhat.com/mailman/listinfo/fedora-package-ann...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds