Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Ruby
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Ruby
ID: USN-1583-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS
Datum: Mi, 26. September 2012, 10:41
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1005
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2126
Applikationen: Ruby

Originalnachricht


--===============1378854493181451348==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="oj4kGyHlBMXGt3Le"
Content-Disposition: inline


--oj4kGyHlBMXGt3Le
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-1583-1
September 26, 2012

ruby1.9.1 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in ruby1.9.1

Software Description:
- ruby1.9.1: Interpreter of object-oriented scripting language Ruby

Details:

It was discovered that Ruby incorrectly allowed untainted strings to be
modified in protective safe levels. An attacker could use this flaw to bypass
intended access restrictions. (CVE-2011-1005)

John Firebaugh discovered that the RubyGems remote gem fetcher did not properly
verify SSL certificates. A remote attacker could exploit this to perform a man
in the middle attack to alter gem files being downloaded for installation.
(CVE-2012-2126)

John Firebaugh discovered that the RubyGems remote gem fetcher allowed
redirection from HTTPS to HTTP. A remote attacker could exploit this to perform
a man in the middle attack to alter gem files being downloaded for
installation. (CVE-2012-2125)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 LTS:
libruby1.9.1 1.9.3.0-1ubuntu2.2

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1583-1
CVE-2011-1005, CVE-2012-2125, CVE-2012-2126

Package Information:
https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.0-1ubuntu2.2


--oj4kGyHlBMXGt3Le
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=MRQx
-----END PGP SIGNATURE-----

--oj4kGyHlBMXGt3Le--


--===============1378854493181451348==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============1378854493181451348==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung