[SECURITY] Fedora 9 Update: ruby-1.8.6.287-2.fc9

updates at fedoraproject.org updates at fedoraproject.org
Thu Oct 9 21:29:45 UTC 2008


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-8738
2008-10-09 04:46:11
--------------------------------------------------------------------------------

Name        : ruby
Product     : Fedora 9
Version     : 1.8.6.287
Release     : 2.fc9
URL         : http://www.ruby-lang.org/
Summary     : An interpreter of object-oriented scripting language
Description :
Ruby is the interpreted scripting language for quick and easy
object-oriented programming.  It has many features to process text
files and to do system management tasks (as in Perl).  It is simple,
straight-forward, and extensible.

--------------------------------------------------------------------------------
Update Information:

Update to new upstream release fixing multiple security issues detailed in the
upstream advisories:    http://www.ruby-lang.org/en/news/2008/08/08/multiple-
vulnerabilities-in-ruby/  - CVE-2008-3655 - multiple insufficient safe mode
restrictions  - CVE-2008-3656 - WEBrick DoS vulnerability (CPU consumption)  -
CVE-2008-3657 - missing "taintness" checks in dl module  - CVE-2008-3905 -
resolv.rb adds random transactions ids and source ports to prevent DNS spoofing
attacks    http://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-
rexml/  - CVE-2008-3790 - DoS in the REXML module    One issue not covered by
any upstream advisory:  - CVE-2008-3443 - DoS in the regular expression engine
--------------------------------------------------------------------------------
ChangeLog:

* Wed Oct  8 2008 Akira TAGOH <tagoh at redhat.com> - 1.8.6.287-2
- CVE-2008-3790: DoS vulnerability in the REXML module.
* Sat Aug 23 2008 Akira TAGOH <tagoh at redhat.com> - 1.8.6.287-1
- New upstream release.
- Security fixes.
  - CVE-2008-3655: Ruby does not properly restrict access to critical
                   variables and methods at various safe levels.
  - CVE-2008-3656: DoS vulnerability in WEBrick.
  - CVE-2008-3657: Lack of taintness check in dl.
  - CVE-2008-1447: DNS spoofing vulnerability in resolv.rb.
  - CVE-2008-3443: Memory allocation failure in Ruby regex engine.
- Remove the unnecessary backported patches.
* Tue Jul  1 2008 Akira TAGOH <tagoh at redhat.com> - 1.8.6.230-4
- Backported from upstream SVN to fix a segfault issue with Array#fill.
* Mon Jun 30 2008 Akira TAGOH <tagoh at redhat.com> - 1.8.6.230-3
- Backported from upstream SVN to fix a segfault issue. (#452825)
- Backported from upstream SVN to fix an integer overflow in rb_ary_fill.
* Wed Jun 25 2008 Akira TAGOH <tagoh at redhat.com> - 1.8.6.230-2
- Fix a segfault issue. (#452809)
* Tue Jun 24 2008 Akira TAGOH <tagoh at redhat.com> - 1.8.6.230-1
- New upstream release.
- Security fixes. (#452294).
  - CVE-2008-1891: WEBrick CGI source disclosure.
  - CVE-2008-2662: Integer overflow in rb_str_buf_append().
  - CVE-2008-2663: Integer overflow in rb_ary_store().
  - CVE-2008-2664: Unsafe use of alloca in rb_str_format().
  - CVE-2008-2725: Integer overflow in rb_ary_splice().
  - CVE-2008-2726: Integer overflow in rb_ary_splice().
- ruby-1.8.6.111-CVE-2007-5162.patch: removed.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #458948 - CVE-2008-3655 ruby: multiple insufficient safe mode restrictions
        https://bugzilla.redhat.com/show_bug.cgi?id=458948
  [ 2 ] Bug #458966 - CVE-2008-3657 ruby: missing "taintness" checks in dl module
        https://bugzilla.redhat.com/show_bug.cgi?id=458966
  [ 3 ] Bug #459266 - CVE-2008-3443 ruby: Memory allocation failure in Ruby regex engine (remotely exploitable DoS)
        https://bugzilla.redhat.com/show_bug.cgi?id=459266
  [ 4 ] Bug #458953 - CVE-2008-3656 ruby: WEBrick DoS vulnerability (CPU consumption)
        https://bugzilla.redhat.com/show_bug.cgi?id=458953
  [ 5 ] Bug #449345 - CVE-2008-1447 implement source UDP port randomization (CERT VU#800113)
        https://bugzilla.redhat.com/show_bug.cgi?id=449345
  [ 6 ] Bug #460134 - CVE-2008-3790 ruby: DoS vulnerability in the REXML module
        https://bugzilla.redhat.com/show_bug.cgi?id=460134
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update ruby' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------




More information about the Fedora-package-announce mailing list