Login
Newsletter
Werbung

Sicherheit: Mangelnde Prüfung von Zertifikaten in Ruby
Aktuelle Meldungen Distributionen
Name: Mangelnde Prüfung von Zertifikaten in Ruby
ID: FEDORA-2013-12123
Distribution: Fedora
Plattformen: Fedora 18
Datum: Do, 11. Juli 2013, 08:38
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073
Applikationen: Ruby

Originalnachricht

Name        : ruby
Product : Fedora 18
Version : 1.9.3.448
Release : 31.fc18
URL : http://ruby-lang.org/
Summary : An interpreter of object-oriented scripting language
Description :
Ruby is the interpreted scripting language for quick and easy
object-oriented programming. It has many features to process text
files and to do system management tasks (as in Perl). It is simple,
straight-forward, and extensible.

-------------------------------------------------------------------------------
-
Update Information:

A vulnerability was found in Ruby's SSL client that could allow
man-in-the-middle attackers to spoof SSL servers via valid certificate issued by a trusted certification authority.

This vulnerability has been assigned the CVE identifier CVE-2013-4073.

This new update should solve this issue.
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Jul 1 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.448-31
- Update to 1.9.3 p448
- Fix hostname check bypassing vulnerability in SSL client
(CVE-2013-4073)
* Thu May 16 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.429-30
- Update to 1.9.3 p429
- Fix object taint bypassing in DL and Fiddle (CVE-2013-2065)
* Mon Feb 25 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.392-29
- Update to 1.9.3 p392
- Fix entity expansion DoS vulnerability in REXML (bug 914716)
* Mon Feb 11 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.385-28
- Update to 1.9.3 p385
* Sat Jan 19 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.374-27
- Update to 1.9.3 p374
- Fix provided variables in pkgconfig (bug 789532:
Vít Ondruch <vondruch@redhat.com>)
* Fri Jan 18 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.362-26
- Provide non-versioned pkgconfig file (bug 789532)
- Use db5 on F-19 (bug 894022)
* Wed Jan 16 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.362-25
- Backport fix for the upstream PR7629, save the proc made from the given block
(bug 895173)
* Wed Jan 2 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.362-24
- Update to 1.9.3.362
* Mon Dec 3 2012 Jaromir Capik <jcapik@redhat.com> - 1.9.3.327-23
- Skipping test_parse.rb (fails on ARM at line 787)
- http://bugs.ruby-lang.org/issues/6899
* Sun Nov 11 2012 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.327-23
- Skip test_str_crypt (on rawhide) for now (upstream bug 7312)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #979295 - ruby: CVE-2013-4073 ruby: hostname check bypassing
vulnerability in SSL client [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=979295
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update ruby' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung