Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in Ruby
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in Ruby
ID: FEDORA-2013-22315
Distribution: Fedora
Plattformen: Fedora 18
Datum: Mi, 11. Dezember 2013, 09:49
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4164
Applikationen: Ruby

Originalnachricht

Name        : ruby
Product : Fedora 18
Version : 1.9.3.484
Release : 32.fc18
URL : http://ruby-lang.org/
Summary : An interpreter of object-oriented scripting language
Description :
Ruby is the interpreted scripting language for quick and easy
object-oriented programming. It has many features to process text
files and to do system management tasks (as in Perl). It is simple,
straight-forward, and extensible.

-------------------------------------------------------------------------------
-
Update Information:

An overflow in floating point number parsing was found in Ruby currently being
shipped on Fedora 19. This vulnerability has been assigned the CVE identifier CVE-2013-4164.

This new rpm should fix this issue.
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Nov 25 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.484-32
- Update to 1.9.3 p484
- Fix heap overflow in floating point parsing (CVE-2013-4164)
* Mon Jul 1 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.448-31
- Update to 1.9.3 p448
- Fix hostname check bypassing vulnerability in SSL client
(CVE-2013-4073)
* Thu May 16 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.429-30
- Update to 1.9.3 p429
- Fix object taint bypassing in DL and Fiddle (CVE-2013-2065)
* Mon Feb 25 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.392-29
- Update to 1.9.3 p392
- Fix entity expansion DoS vulnerability in REXML (bug 914716)
* Mon Feb 11 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.385-28
- Update to 1.9.3 p385
* Sat Jan 19 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.374-27
- Update to 1.9.3 p374
- Fix provided variables in pkgconfig (bug 789532:
Vít Ondruch <vondruch@redhat.com>)
* Fri Jan 18 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.362-26
- Provide non-versioned pkgconfig file (bug 789532)
- Use db5 on F-19 (bug 894022)
* Wed Jan 16 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.362-25
- Backport fix for the upstream PR7629, save the proc made from the given block
(bug 895173)
* Wed Jan 2 2013 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.362-24
- Update to 1.9.3.362
* Mon Dec 3 2012 Jaromir Capik <jcapik@redhat.com> - 1.9.3.327-23
- Skipping test_parse.rb (fails on ARM at line 787)
- http://bugs.ruby-lang.org/issues/6899
* Sun Nov 11 2012 Mamoru TASAKA <mtasaka@fedoraproject.org> -
1.9.3.327-23
- Skip test_str_crypt (on rawhide) for now (upstream bug 7312)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1033546 - CVE-2013-4164 ruby: heap overflow in floating point
parsing [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1033546
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update ruby' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung