lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041108205307.24351.qmail@updates.mandrakesoft.com>
From: security at linux-mandrake.com (Mandrake Linux Security Team)
Subject: MDKSA-2004:128 - Updated ruby packages fix remote DoS vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           ruby
 Advisory ID:            MDKSA-2004:128
 Date:                   November 8th, 2004

 Affected versions:	 10.0, 10.1, 9.2, Corporate Server 2.1
 ______________________________________________________________________

 Problem Description:

 Andres Salomon noticed a problem with the CGI session management in
 Ruby.  The CGI:Session's FileStore implementations store session
 information in an insecure manner by just creating files and ignoring
 permission issues (CAN-2004-0755).
 
 The ruby developers have corrected a problem in the ruby CGI module
 that can be triggered remotely and cause an inifinite loop on the
 server (CAN-2004-0983).
 
 The updated packages are patched to prevent these problems.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0755
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0983
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 78ad14ec966b0555089e94ad19604b44  10.0/RPMS/ruby-1.8.1-1.2.100mdk.i586.rpm
 33d12ff3583ced4c88be97fb473b0813  10.0/RPMS/ruby-devel-1.8.1-1.2.100mdk.i586.rpm
 776bfc4df4f2c093efceebe470391707  10.0/RPMS/ruby-doc-1.8.1-1.2.100mdk.i586.rpm
 890a20e02c7f46b47adf6a8f78223659  10.0/RPMS/ruby-tk-1.8.1-1.2.100mdk.i586.rpm
 35abe65664a41317a279ef320d56ac46  10.0/SRPMS/ruby-1.8.1-1.2.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 a264a378c30202cea578c9a4594b3eeb  amd64/10.0/RPMS/ruby-1.8.1-1.2.100mdk.amd64.rpm
 37bfe093ef80363bedba7b2dadf51bd6  amd64/10.0/RPMS/ruby-devel-1.8.1-1.2.100mdk.amd64.rpm
 f87a35ff158820c1e237306a76ad45c2  amd64/10.0/RPMS/ruby-doc-1.8.1-1.2.100mdk.amd64.rpm
 c2bed939a9ca7da197f949b71a3a1687  amd64/10.0/RPMS/ruby-tk-1.8.1-1.2.100mdk.amd64.rpm
 35abe65664a41317a279ef320d56ac46  amd64/10.0/SRPMS/ruby-1.8.1-1.2.100mdk.src.rpm

 Mandrakelinux 10.1:
 101f9a5772044b5267a1be98b36dcac5  10.1/RPMS/ruby-1.8.1-4.2.101mdk.i586.rpm
 72c1c8413c801e599dfc174041754384  10.1/RPMS/ruby-devel-1.8.1-4.2.101mdk.i586.rpm
 b9c6fce1facc4bdbf829435b6075d266  10.1/RPMS/ruby-doc-1.8.1-4.2.101mdk.i586.rpm
 b2f516a033fb089f5a5819dcb9f2a38c  10.1/RPMS/ruby-tk-1.8.1-4.2.101mdk.i586.rpm
 d356531e89645a5aa9e2f5ad7dac55dd  10.1/SRPMS/ruby-1.8.1-4.2.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 dc340846e8c30a4ef9115eb7e20520c3  x86_64/10.1/RPMS/ruby-1.8.1-4.2.101mdk.x86_64.rpm
 234644faf341899ae3f251cbfb09f0da  x86_64/10.1/RPMS/ruby-devel-1.8.1-4.2.101mdk.x86_64.rpm
 b4b7876cc7762e09469e2d60ccb7f4f2  x86_64/10.1/RPMS/ruby-doc-1.8.1-4.2.101mdk.x86_64.rpm
 4177169d6970c4dd3210ca8a15cffead  x86_64/10.1/RPMS/ruby-tk-1.8.1-4.2.101mdk.x86_64.rpm
 d356531e89645a5aa9e2f5ad7dac55dd  x86_64/10.1/SRPMS/ruby-1.8.1-4.2.101mdk.src.rpm

 Corporate Server 2.1:
 8467a2a206b02e729e39601e1762af1c  corporate/2.1/RPMS/ruby-1.6.7-5.2.C21mdk.i586.rpm
 236abcc01b4cabc4f70bbf76d73a604b  corporate/2.1/RPMS/ruby-devel-1.6.7-5.2.C21mdk.i586.rpm
 47155447664218a143dca3f9c03c1316  corporate/2.1/RPMS/ruby-doc-1.6.7-5.2.C21mdk.i586.rpm
 97ca9727e9f927e30723eeda3a935568  corporate/2.1/RPMS/ruby-tk-1.6.7-5.2.C21mdk.i586.rpm
 451b383b9a34d35fb11bab1e917437de  corporate/2.1/SRPMS/ruby-1.6.7-5.2.C21mdk.src.rpm

 Corporate Server 2.1/x86_64:
 175f8a45c99de3487df134df6fb22ef4  x86_64/corporate/2.1/RPMS/ruby-1.6.7-5.2.C21mdk.x86_64.rpm
 1d303628932bff75f684be71a6e453f1  x86_64/corporate/2.1/RPMS/ruby-devel-1.6.7-5.2.C21mdk.x86_64.rpm
 a937b87c10e5f3ecb41610e64b09c9ba  x86_64/corporate/2.1/RPMS/ruby-doc-1.6.7-5.2.C21mdk.x86_64.rpm
 40a44ec634f8929394835d5c561ad212  x86_64/corporate/2.1/RPMS/ruby-tk-1.6.7-5.2.C21mdk.x86_64.rpm
 451b383b9a34d35fb11bab1e917437de  x86_64/corporate/2.1/SRPMS/ruby-1.6.7-5.2.C21mdk.src.rpm

 Mandrakelinux 9.2:
 6f8ee2c9308debe5b391b322f93e9524  9.2/RPMS/ruby-1.8.0-4.2.92mdk.i586.rpm
 58cabdd982a8c760e7af0fb5e81d9dc7  9.2/RPMS/ruby-devel-1.8.0-4.2.92mdk.i586.rpm
 c7b7d678f4cb76b79996380f2f04a747  9.2/RPMS/ruby-doc-1.8.0-4.2.92mdk.i586.rpm
 c613fe92253fdfe9f581eb0af17f75d1  9.2/RPMS/ruby-tk-1.8.0-4.2.92mdk.i586.rpm
 95e4882f99900e40a8e9680ecf5d08e1  9.2/SRPMS/ruby-1.8.0-4.2.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 c4d3b440f5c11465b8d496bf4f531df4  amd64/9.2/RPMS/ruby-1.8.0-4.2.92mdk.amd64.rpm
 ca6c4b4aac7aa3d091ef62f0cefa3820  amd64/9.2/RPMS/ruby-devel-1.8.0-4.2.92mdk.amd64.rpm
 ce56f743c39e354939ff4ca43f288d14  amd64/9.2/RPMS/ruby-doc-1.8.0-4.2.92mdk.amd64.rpm
 096e63f35549468726f50ffe2bfa28e7  amd64/9.2/RPMS/ruby-tk-1.8.0-4.2.92mdk.amd64.rpm
 95e4882f99900e40a8e9680ecf5d08e1  amd64/9.2/SRPMS/ruby-1.8.0-4.2.92mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBj9yymqjQ0CJFipgRApMsAKCTPn9wTytfhR6er9Xz+gPAlBGTRQCgo6ur
JC6CkTKLC4uRqAYHbhFZpyU=
=I8fV
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ