[ubuntu/trusty-security] ruby1.9.1 1.9.3.484-2ubuntu1.3 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Tue Jul 25 17:32:03 UTC 2017
ruby1.9.1 (1.9.3.484-2ubuntu1.3) trusty-security; urgency=medium
* SECURITY UPDATE: DoS and possible code execution in DL::dlopen
- debian/patches/CVE-2009-5147.patch: check tainted string arguments in
ext/dl/handle.c.
- CVE-2009-5147
* SECURITY UPDATE: incorrect hostname matching
- debian/patches/CVE-2015-1855.patch: implement stricter hostname
validation per RFC 6125 in ext/openssl/lib/openssl/ssl-internal.rb,
added tests to test/openssl/test_ssl.rb.
- CVE-2015-1855
* SECURITY UPDATE: SMTP command injection
- debian/patches/CVE-2015-9096.patch: don't allow bare CR or LF in
lib/net/smtp.rb, added test to test/net/smtp/test_smtp.rb.
- CVE-2015-9096
* SECURITY UPDATE: type confusion in tcltkip
- debian/patches/CVE-2016-2337.patch: check argument in
ext/tk/tcltklib.c.
- CVE-2016-2337
* SECURITY UPDATE: heap overflow in Fiddle::Function.new
- debian/patches/CVE-2016-2339.patch: check arguments in
ext/fiddle/function.c.
- CVE-2016-2339
* SECURITY UPDATE: use of same initialization vector (IV)
- debian/patches/CVE-2016-7798.patch: don't set dummy key in
ext/openssl/ossl_cipher.c, added test to test/openssl/test_cipher.rb.
- CVE-2016-7798
Date: 2017-06-20 14:19:15.667819+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.484-2ubuntu1.3
-------------- next part --------------
Sorry, changesfile not available.
More information about the Trusty-changes
mailing list