drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Ruby
Name: |
Mehrere Probleme in Ruby |
|
ID: |
USN-1583-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 LTS |
|
Datum: |
Mi, 26. September 2012, 10:41 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1005
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2125
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2126 |
|
Applikationen: |
Ruby |
|
Originalnachricht |
--===============1378854493181451348== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="oj4kGyHlBMXGt3Le" Content-Disposition: inline
--oj4kGyHlBMXGt3Le Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-1583-1 September 26, 2012
ruby1.9.1 vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary:
Several security issues were fixed in ruby1.9.1
Software Description: - ruby1.9.1: Interpreter of object-oriented scripting language Ruby
Details:
It was discovered that Ruby incorrectly allowed untainted strings to be modified in protective safe levels. An attacker could use this flaw to bypass intended access restrictions. (CVE-2011-1005)
John Firebaugh discovered that the RubyGems remote gem fetcher did not properly verify SSL certificates. A remote attacker could exploit this to perform a man in the middle attack to alter gem files being downloaded for installation. (CVE-2012-2126)
John Firebaugh discovered that the RubyGems remote gem fetcher allowed redirection from HTTPS to HTTP. A remote attacker could exploit this to perform a man in the middle attack to alter gem files being downloaded for installation. (CVE-2012-2125)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 LTS: libruby1.9.1 1.9.3.0-1ubuntu2.2
In general, a standard system update will make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-1583-1 CVE-2011-1005, CVE-2012-2125, CVE-2012-2126
Package Information: https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.0-1ubuntu2.2
--oj4kGyHlBMXGt3Le Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (GNU/Linux)
iQIcBAEBCgAGBQJQYmlrAAoJENaSAD2qAscKS/MQALDPqu1Je9V9XjiZLPihihy4 Cxs6EnSctbtAcawEhaf/GkS87hmsuu7Ir4sr7Jv9alm5IfoDzv5RMNu/UciiGsir HdrI29W51xKpQBkfoPnk5RQJlc1ZNahZ6dhnKZFXDU8UvWkMrVbqFnGVxaviVyoV VeH8NY5aIse0Pz5OIw+Rilzyadisy72kcTUXCDMLajx+BWxEeBzwS92ZSPA+0fFJ yoXvpKpRHNCe/eSVtOiLTI2G4wFRzrG1rE6PBGzXrMw/SADDwLp9+LYGqobPdyM+ 2iOuT6ucrLgPHzM4x3JA+njW6D7uxeLD/DwByWwAYsV/Bq6XO8/ImPTj8pCYyKg6 BIuGIdmvMwmN2Yi4lh5ybRpjsSVUWNt87v2zsKeQ84wcqyWQycBytMMADdI8tNo6 jMtJVlhvVTCIDSfMFLLY8929W+suipCunU3NAcL7I6q4qTrvIy01YfVjyJSb/0z5 gkAqZp+RJEAZIYJPEu2fT+mAFrR3pEwspyK4gApmdCdoGRjyJjVYU1LWM+3S+qEc 4aO8iDnLGuQ/Gb1DcLo4D13OOWeKIp9eoE0JDy6K9ELbPr6xhtaNIGppsqzN4/3A zpzIuIquscmoVYYwHXO8VGDM/h2Y9SF5BNNcSp0azp+R9W+Vd1LGH2gqE6NeIQmB Tn2OLBsMLhdrXpfvjUjM =MRQx -----END PGP SIGNATURE-----
--oj4kGyHlBMXGt3Le--
--===============1378854493181451348== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============1378854493181451348==--
|
|
|
|