MDKSA-2004:128 - Updated ruby packages fix remote DoS vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandrakelinux Security Update Advisory
_______________________________________________________________________
Package name: ruby
Advisory ID: MDKSA-2004:128
Date: November 8th, 2004
Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1
______________________________________________________________________
Problem Description:
Andres Salomon noticed a problem with the CGI session management in
Ruby. The CGI:Session's FileStore implementations store session
information in an insecure manner by just creating files and ignoring
permission issues (CAN-2004-0755).
The ruby developers have corrected a problem in the ruby CGI module
that can be triggered remotely and cause an inifinite loop on the
server (CAN-2004-0983).
The updated packages are patched to prevent these problems.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0755
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0983
______________________________________________________________________
Updated Packages:
Mandrakelinux 10.0:
78ad14ec966b0555089e94ad19604b44 10.0/RPMS/ruby-1.8.1-1.2.100mdk.i586.rpm
33d12ff3583ced4c88be97fb473b0813
10.0/RPMS/ruby-devel-1.8.1-1.2.100mdk.i586.rpm
776bfc4df4f2c093efceebe470391707 10.0/RPMS/ruby-doc-1.8.1-1.2.100mdk.i586.rpm
890a20e02c7f46b47adf6a8f78223659 10.0/RPMS/ruby-tk-1.8.1-1.2.100mdk.i586.rpm
35abe65664a41317a279ef320d56ac46 10.0/SRPMS/ruby-1.8.1-1.2.100mdk.src.rpm
Mandrakelinux 10.0/AMD64:
a264a378c30202cea578c9a4594b3eeb
amd64/10.0/RPMS/ruby-1.8.1-1.2.100mdk.amd64.rpm
37bfe093ef80363bedba7b2dadf51bd6
amd64/10.0/RPMS/ruby-devel-1.8.1-1.2.100mdk.amd64.rpm
f87a35ff158820c1e237306a76ad45c2
amd64/10.0/RPMS/ruby-doc-1.8.1-1.2.100mdk.amd64.rpm
c2bed939a9ca7da197f949b71a3a1687
amd64/10.0/RPMS/ruby-tk-1.8.1-1.2.100mdk.amd64.rpm
35abe65664a41317a279ef320d56ac46
amd64/10.0/SRPMS/ruby-1.8.1-1.2.100mdk.src.rpm
Mandrakelinux 10.1:
101f9a5772044b5267a1be98b36dcac5 10.1/RPMS/ruby-1.8.1-4.2.101mdk.i586.rpm
72c1c8413c801e599dfc174041754384
10.1/RPMS/ruby-devel-1.8.1-4.2.101mdk.i586.rpm
b9c6fce1facc4bdbf829435b6075d266 10.1/RPMS/ruby-doc-1.8.1-4.2.101mdk.i586.rpm
b2f516a033fb089f5a5819dcb9f2a38c 10.1/RPMS/ruby-tk-1.8.1-4.2.101mdk.i586.rpm
d356531e89645a5aa9e2f5ad7dac55dd 10.1/SRPMS/ruby-1.8.1-4.2.101mdk.src.rpm
Mandrakelinux 10.1/X86_64:
dc340846e8c30a4ef9115eb7e20520c3
x86_64/10.1/RPMS/ruby-1.8.1-4.2.101mdk.x86_64.rpm
234644faf341899ae3f251cbfb09f0da
x86_64/10.1/RPMS/ruby-devel-1.8.1-4.2.101mdk.x86_64.rpm
b4b7876cc7762e09469e2d60ccb7f4f2
x86_64/10.1/RPMS/ruby-doc-1.8.1-4.2.101mdk.x86_64.rpm
4177169d6970c4dd3210ca8a15cffead
x86_64/10.1/RPMS/ruby-tk-1.8.1-4.2.101mdk.x86_64.rpm
d356531e89645a5aa9e2f5ad7dac55dd
x86_64/10.1/SRPMS/ruby-1.8.1-4.2.101mdk.src.rpm
Corporate Server 2.1:
8467a2a206b02e729e39601e1762af1c
corporate/2.1/RPMS/ruby-1.6.7-5.2.C21mdk.i586.rpm
236abcc01b4cabc4f70bbf76d73a604b
corporate/2.1/RPMS/ruby-devel-1.6.7-5.2.C21mdk.i586.rpm
47155447664218a143dca3f9c03c1316
corporate/2.1/RPMS/ruby-doc-1.6.7-5.2.C21mdk.i586.rpm
97ca9727e9f927e30723eeda3a935568
corporate/2.1/RPMS/ruby-tk-1.6.7-5.2.C21mdk.i586.rpm
451b383b9a34d35fb11bab1e917437de
corporate/2.1/SRPMS/ruby-1.6.7-5.2.C21mdk.src.rpm
Corporate Server 2.1/x86_64:
175f8a45c99de3487df134df6fb22ef4
x86_64/corporate/2.1/RPMS/ruby-1.6.7-5.2.C21mdk.x86_64.rpm
1d303628932bff75f684be71a6e453f1
x86_64/corporate/2.1/RPMS/ruby-devel-1.6.7-5.2.C21mdk.x86_64.rpm
a937b87c10e5f3ecb41610e64b09c9ba
x86_64/corporate/2.1/RPMS/ruby-doc-1.6.7-5.2.C21mdk.x86_64.rpm
40a44ec634f8929394835d5c561ad212
x86_64/corporate/2.1/RPMS/ruby-tk-1.6.7-5.2.C21mdk.x86_64.rpm
451b383b9a34d35fb11bab1e917437de
x86_64/corporate/2.1/SRPMS/ruby-1.6.7-5.2.C21mdk.src.rpm
Mandrakelinux 9.2:
6f8ee2c9308debe5b391b322f93e9524 9.2/RPMS/ruby-1.8.0-4.2.92mdk.i586.rpm
58cabdd982a8c760e7af0fb5e81d9dc7 9.2/RPMS/ruby-devel-1.8.0-4.2.92mdk.i586.rpm
c7b7d678f4cb76b79996380f2f04a747 9.2/RPMS/ruby-doc-1.8.0-4.2.92mdk.i586.rpm
c613fe92253fdfe9f581eb0af17f75d1 9.2/RPMS/ruby-tk-1.8.0-4.2.92mdk.i586.rpm
95e4882f99900e40a8e9680ecf5d08e1 9.2/SRPMS/ruby-1.8.0-4.2.92mdk.src.rpm
Mandrakelinux 9.2/AMD64:
c4d3b440f5c11465b8d496bf4f531df4 amd64/9.2/RPMS/ruby-1.8.0-4.2.92mdk.amd64.rpm
ca6c4b4aac7aa3d091ef62f0cefa3820
amd64/9.2/RPMS/ruby-devel-1.8.0-4.2.92mdk.amd64.rpm
ce56f743c39e354939ff4ca43f288d14
amd64/9.2/RPMS/ruby-doc-1.8.0-4.2.92mdk.amd64.rpm
096e63f35549468726f50ffe2bfa28e7
amd64/9.2/RPMS/ruby-tk-1.8.0-4.2.92mdk.amd64.rpm
95e4882f99900e40a8e9680ecf5d08e1 amd64/9.2/SRPMS/ruby-1.8.0-4.2.92mdk.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandrakesoft for security. You can obtain
the GPG public key of the Mandrakelinux Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandrakelinux at:
http://www.mandrakesoft.com/security/advisories
If you want to report vulnerabilities, please contact
security_linux-mandrake.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFBj9yymqjQ0CJFipgRApMsAKCTPn9wTytfhR6er9Xz+gPAlBGTRQCgo6ur
JC6CkTKLC4uRqAYHbhFZpyU=
=I8fV
-----END PGP SIGNATURE-----