[ubuntu/lucid] ruby1.9.1 1.9.1.378-1 (Accepted)
Ubuntu Installer
archive at ubuntu.com
Mon Mar 1 16:36:24 GMT 2010
ruby1.9.1 (1.9.1.378-1) unstable; urgency=medium
* New upstream release
* The upstream has fixed a vulnerability in WEBrick, a part of Ruby's
standard library. WEBrick lets attackers to inject malicious escape
sequences to its logs, making it possible for dangerous control characters
to be executed on a victim's terminal emulator. (Closes: #564646)
Date: Mon, 01 Mar 2010 15:39:20 +0000
Changed-By: Lucas Nussbaum <lucas at lucas-nussbaum.net>
Maintainer: akira yamada <akira at debian.org>
Origin: Debian/unstable
https://launchpad.net/ubuntu/lucid/+source/ruby1.9.1/1.9.1.378-1
-------------- next part --------------
Origin: Debian/unstable
Format: 1.7
Date: Mon, 01 Mar 2010 15:39:20 +0000
Source: ruby1.9.1
Binary: ruby1.9.1, libruby1.9.1, libruby1.9.1-dbg, ruby1.9.1-dev, libdbm-ruby1.9.1, libgdbm-ruby1.9.1, libreadline-ruby1.9.1, libtcltk-ruby1.9.1, libopenssl-ruby1.9.1, ruby1.9.1-examples, ruby1.9.1-elisp, ri1.9.1, rdoc1.9.1, irb1.9.1, ruby1.9.1-full
Architecture: source
Version: 1.9.1.378-1
Distribution: lucid
Urgency: medium
Maintainer: akira yamada <akira at debian.org>
Changed-By: Lucas Nussbaum <lucas at lucas-nussbaum.net>
Description:
ruby1.9.1 - Interpreter of object-oriented scripting language Ruby 1.9.1
Closes: 564646
Changes:
ruby1.9.1 (1.9.1.378-1) unstable; urgency=medium
.
* New upstream release
* The upstream has fixed a vulnerability in WEBrick, a part of Ruby's
standard library. WEBrick lets attackers to inject malicious escape
sequences to its logs, making it possible for dangerous control characters
to be executed on a victim's terminal emulator. (Closes: #564646)
Files:
1ed1443ac28418a116f447dc349361a5 50282 ruby optional ruby1.9.1_1.9.1.378-1.diff.gz
9fc5941bda150ac0a33b299e1e53654c 9074768 ruby optional ruby1.9.1_1.9.1.378.orig.tar.gz
82cb9c4405722e6ab6acb1fd9be5dd2f 1654 ruby optional ruby1.9.1_1.9.1.378-1.dsc
More information about the Lucid-changes
mailing list