[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1FYWxo-0003nU-Ss@mercury.mandriva.com>
Date: Tue, 25 Apr 2006 17:29:00 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2006:079 ] - Updated ruby packages fix vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:079
http://www.mandriva.com/security/
_______________________________________________________________________
Package : ruby
Date : April 25, 2006
Affected: 10.2, 2006.0, Corporate 3.0
_______________________________________________________________________
Problem Description:
A vulnerability in how ruby's HTTP module uses blocking sockets was
reported by Yukihiro Matsumoto. By sending large amounts of data to a
server application using this module, a remote attacker could exploit
it to render the application unusable and not respond to other client
requests.
The updated packages have been patched to fix this problem.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1931
_______________________________________________________________________
Updated Packages:
Mandriva Linux 10.2:
f9745c919a26b88653c1bb8d65b22656 10.2/RPMS/ruby-1.8.2-6.3.102mdk.i586.rpm
a70aa5e8d43962a8e1432eba455550a1 10.2/RPMS/ruby-devel-1.8.2-6.3.102mdk.i586.rpm
ef56fa7d95bb07869fd990174fba0a80 10.2/RPMS/ruby-doc-1.8.2-6.3.102mdk.i586.rpm
46cf35ec68925266be3476e0e2244dba 10.2/RPMS/ruby-tk-1.8.2-6.3.102mdk.i586.rpm
9a297ac138f1be885dbf9bdb3f963dca 10.2/SRPMS/ruby-1.8.2-6.3.102mdk.src.rpm
Mandriva Linux 10.2/X86_64:
7a961ba32e721306fc18cc84138131fa x86_64/10.2/RPMS/ruby-1.8.2-6.3.102mdk.x86_64.rpm
6215d5fe2525ddcaf47b22443be40d29 x86_64/10.2/RPMS/ruby-devel-1.8.2-6.3.102mdk.x86_64.rpm
6bf001166ce1fe417513be0da4afa983 x86_64/10.2/RPMS/ruby-doc-1.8.2-6.3.102mdk.x86_64.rpm
dc54e4e1cb352e2a31578b528b0fae24 x86_64/10.2/RPMS/ruby-tk-1.8.2-6.3.102mdk.x86_64.rpm
9a297ac138f1be885dbf9bdb3f963dca x86_64/10.2/SRPMS/ruby-1.8.2-6.3.102mdk.src.rpm
Mandriva Linux 2006.0:
3144dc749cdb9da398064c2cf34103fe 2006.0/RPMS/ruby-1.8.2-7.2.20060mdk.i586.rpm
1bf85e3cd1456dbda21fd95f1626b28f 2006.0/RPMS/ruby-devel-1.8.2-7.2.20060mdk.i586.rpm
80000d9bf73c957174c6ce8a7c637147 2006.0/RPMS/ruby-doc-1.8.2-7.2.20060mdk.i586.rpm
272d3970702ec07e44a0469d1f431380 2006.0/RPMS/ruby-tk-1.8.2-7.2.20060mdk.i586.rpm
5cd34c71849ac8eebe80c6389178a5a8 2006.0/SRPMS/ruby-1.8.2-7.2.20060mdk.src.rpm
Mandriva Linux 2006.0/X86_64:
c032856335423079f3a68b7eeaeda281 x86_64/2006.0/RPMS/ruby-1.8.2-7.2.20060mdk.x86_64.rpm
aa44a1b8179d94c3ef4504d504fdb01b x86_64/2006.0/RPMS/ruby-devel-1.8.2-7.2.20060mdk.x86_64.rpm
a409a90806495d8a074fa15d9191d053 x86_64/2006.0/RPMS/ruby-doc-1.8.2-7.2.20060mdk.x86_64.rpm
4a13e6ade495ac6c2d6068d88674d396 x86_64/2006.0/RPMS/ruby-tk-1.8.2-7.2.20060mdk.x86_64.rpm
5cd34c71849ac8eebe80c6389178a5a8 x86_64/2006.0/SRPMS/ruby-1.8.2-7.2.20060mdk.src.rpm
Corporate 3.0:
249f78bda13201aecd66a30379a23209 corporate/3.0/RPMS/ruby-1.8.1-1.5.C30mdk.i586.rpm
210ae59468330f26d71496c636fc4dcc corporate/3.0/RPMS/ruby-devel-1.8.1-1.5.C30mdk.i586.rpm
a69109163c0cd1c22616dce20e4924cf corporate/3.0/RPMS/ruby-doc-1.8.1-1.5.C30mdk.i586.rpm
cbfdf5cab0ae9c82731a94ef51f60e41 corporate/3.0/RPMS/ruby-tk-1.8.1-1.5.C30mdk.i586.rpm
7db43332f4a6cd0d6f530f2e423315ac corporate/3.0/SRPMS/ruby-1.8.1-1.5.C30mdk.src.rpm
Corporate 3.0/X86_64:
3ec5b89b32196866594ac0fbeb852e66 x86_64/corporate/3.0/RPMS/ruby-1.8.1-1.5.C30mdk.x86_64.rpm
63df0377e01145f410075b7122c1e541 x86_64/corporate/3.0/RPMS/ruby-devel-1.8.1-1.5.C30mdk.x86_64.rpm
54580e762f81bceb21bc62aa7f4f934b x86_64/corporate/3.0/RPMS/ruby-doc-1.8.1-1.5.C30mdk.x86_64.rpm
f8e720ecbeafc2dceb8522272b213e08 x86_64/corporate/3.0/RPMS/ruby-tk-1.8.1-1.5.C30mdk.x86_64.rpm
7db43332f4a6cd0d6f530f2e423315ac x86_64/corporate/3.0/SRPMS/ruby-1.8.1-1.5.C30mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)
iD8DBQFEToPBmqjQ0CJFipgRAjYgAJ9tf1nRJZhBInVNILG53lQvy1nTOwCfQtJu
yoIIcgaXpYqbHvIzbKdUL04=
=FxkL
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists