drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Prüfung von Zertifikaten in Ruby
Name: |
Mangelnde Prüfung von Zertifikaten in Ruby |
|
ID: |
FEDORA-2013-12123 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 18 |
|
Datum: |
Do, 11. Juli 2013, 08:38 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073 |
|
Applikationen: |
Ruby |
|
Originalnachricht |
Name : ruby Product : Fedora 18 Version : 1.9.3.448 Release : 31.fc18 URL : http://ruby-lang.org/ Summary : An interpreter of object-oriented scripting language Description : Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible.
------------------------------------------------------------------------------- - Update Information:
A vulnerability was found in Ruby's SSL client that could allow man-in-the-middle attackers to spoof SSL servers via valid certificate issued by a trusted certification authority.
This vulnerability has been assigned the CVE identifier CVE-2013-4073.
This new update should solve this issue. ------------------------------------------------------------------------------- - ChangeLog:
* Mon Jul 1 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> - 1.9.3.448-31 - Update to 1.9.3 p448 - Fix hostname check bypassing vulnerability in SSL client (CVE-2013-4073) * Thu May 16 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> - 1.9.3.429-30 - Update to 1.9.3 p429 - Fix object taint bypassing in DL and Fiddle (CVE-2013-2065) * Mon Feb 25 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> - 1.9.3.392-29 - Update to 1.9.3 p392 - Fix entity expansion DoS vulnerability in REXML (bug 914716) * Mon Feb 11 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> - 1.9.3.385-28 - Update to 1.9.3 p385 * Sat Jan 19 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> - 1.9.3.374-27 - Update to 1.9.3 p374 - Fix provided variables in pkgconfig (bug 789532: Vít Ondruch <vondruch@redhat.com>) * Fri Jan 18 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> - 1.9.3.362-26 - Provide non-versioned pkgconfig file (bug 789532) - Use db5 on F-19 (bug 894022) * Wed Jan 16 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> - 1.9.3.362-25 - Backport fix for the upstream PR7629, save the proc made from the given block (bug 895173) * Wed Jan 2 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> - 1.9.3.362-24 - Update to 1.9.3.362 * Mon Dec 3 2012 Jaromir Capik <jcapik@redhat.com> - 1.9.3.327-23 - Skipping test_parse.rb (fails on ARM at line 787) - http://bugs.ruby-lang.org/issues/6899 * Sun Nov 11 2012 Mamoru TASAKA <mtasaka@fedoraproject.org> - 1.9.3.327-23 - Skip test_str_crypt (on rawhide) for now (upstream bug 7312) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #979295 - ruby: CVE-2013-4073 ruby: hostname check bypassing vulnerability in SSL client [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=979295 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update ruby' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|