[ubuntu/trusty-security] ruby1.9.1 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Tue Jul 25 17:32:03 UTC 2017

ruby1.9.1 ( trusty-security; urgency=medium

  * SECURITY UPDATE: DoS and possible code execution in DL::dlopen
    - debian/patches/CVE-2009-5147.patch: check tainted string arguments in
    - CVE-2009-5147
  * SECURITY UPDATE: incorrect hostname matching
    - debian/patches/CVE-2015-1855.patch: implement stricter hostname
      validation per RFC 6125 in ext/openssl/lib/openssl/ssl-internal.rb,
      added tests to test/openssl/test_ssl.rb.
    - CVE-2015-1855
  * SECURITY UPDATE: SMTP command injection
    - debian/patches/CVE-2015-9096.patch: don't allow bare CR or LF in
      lib/net/smtp.rb, added test to test/net/smtp/test_smtp.rb.
    - CVE-2015-9096
  * SECURITY UPDATE: type confusion in tcltkip
    - debian/patches/CVE-2016-2337.patch: check argument in
    - CVE-2016-2337
  * SECURITY UPDATE: heap overflow in Fiddle::Function.new
    - debian/patches/CVE-2016-2339.patch: check arguments in
    - CVE-2016-2339
  * SECURITY UPDATE: use of same initialization vector (IV)
    - debian/patches/CVE-2016-7798.patch: don't set dummy key in
      ext/openssl/ossl_cipher.c, added test to test/openssl/test_cipher.rb.
    - CVE-2016-7798

Date: 2017-06-20 14:19:15.667819+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
-------------- next part --------------
Sorry, changesfile not available.

More information about the Trusty-changes mailing list