English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 105790 CVE descriptions
and 56160 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-5664
2008-06-25 00:43:26
--------------------------------------------------------------------------------

Name        : ruby
Product     : Fedora 9
Version     : 1.8.6.230
Release     : 1.fc9
URL         : http://www.ruby-lang.org/
Summary     : An interpreter of object-oriented scripting language
Description :
Ruby is the interpreted scripting language for quick and easy
object-oriented programming.  It has many features to process text
files and to do system management tasks (as in Perl).  It is simple,
straight-forward, and extensible.

--------------------------------------------------------------------------------
ChangeLog:

* Tue Jun 24 2008 Akira TAGOH <tagoh@redhat.com> - 1.8.6.230-1
- New upstream release.
- Security fixes. (#452294).
  - CVE-2008-1891: WEBrick CGI source disclosure.
  - CVE-2008-2662: Integer overflow in rb_str_buf_append().
  - CVE-2008-2663: Integer overflow in rb_ary_store().
  - CVE-2008-2664: Unsafe use of alloca in rb_str_format().
  - CVE-2008-2725: Integer overflow in rb_ary_splice().
  - CVE-2008-2726: Integer overflow in rb_ary_splice().
- ruby-1.8.6.111-CVE-2007-5162.patch: removed.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #450825 - CVE-2008-2663 ruby: Integer overflows in rb_ary_store()
        https://bugzilla.redhat.com/show_bug.cgi?id=450825
  [ 2 ] Bug #443829 - CVE-2008-1891 ruby: WEBrick CGI source disclosure
        https://bugzilla.redhat.com/show_bug.cgi?id=443829
  [ 3 ] Bug #451821 - CVE-2008-2725 ruby: integer overflow in rb_ary_splice() (ruby-1.8.x) - REALLOC_N
        https://bugzilla.redhat.com/show_bug.cgi?id=451821
  [ 4 ] Bug #450821 - CVE-2008-2662 ruby: Integer overflows in rb_str_buf_append()
        https://bugzilla.redhat.com/show_bug.cgi?id=450821
  [ 5 ] Bug #451828 - CVE-2008-2726 ruby: integer overflow in rb_ary_splice() (ruby-1.8.x) - beg + rlen
        https://bugzilla.redhat.com/show_bug.cgi?id=451828
  [ 6 ] Bug #450834 - CVE-2008-2664 ruby: Unsafe use of alloca in rb_str_format()
        https://bugzilla.redhat.com/show_bug.cgi?id=450834
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update ruby' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2017 E-Soft Inc. All rights reserved.