Subject: | |
From: | |
Reply To: | |
Date: | Wed, 22 Oct 2008 19:04:41 -0500 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Moderate: ruby security update
Issue date: 2008-10-21
CVE Names: CVE-2008-3443 CVE-2008-3655 CVE-2008-3656
CVE-2008-3657 CVE-2008-3790 CVE-2008-3905
The Ruby DNS resolver library, resolv.rb, used predictable transaction
IDs and a fixed source port when sending DNS requests. A remote attacker
could use this flaw to spoof a malicious reply to a DNS query.
(CVE-2008-3905)
Ruby's XML document parsing module (REXML) was prone to a denial of
service attack via XML documents with large XML entity definitions
recursion. A specially-crafted XML file could cause a Ruby application
using the REXML module to use an excessive amount of CPU and memory.
(CVE-2008-3790)
An insufficient "taintness" check flaw was discovered in Ruby's DL
module, which provides direct access to the C language functions. An
attacker could use this flaw to bypass intended safe-level restrictions
by calling external C functions with the arguments from an untrusted
tainted inputs. (CVE-2008-3657)
A denial of service flaw was discovered in WEBrick, Ruby's HTTP server
toolkit. A remote attacker could send a specially-crafted HTTP request
to a WEBrick server that would cause the server to use an excessive
amount of CPU time. (CVE-2008-3656)
A number of flaws were found in the safe-level restrictions in Ruby. It
was possible for an attacker to create a carefully crafted malicious
script that can allow the bypass of certain safe-level restrictions.
(CVE-2008-3655)
A denial of service flaw was found in Ruby's regular expression engine.
If a Ruby script tried to process a large amount of data via a regular
expression, it could cause Ruby to enter an infinite-loop and crash.
(CVE-2008-3443)
SL 3.0.x
SRPMS:
ruby-1.6.8-13.el3.src.rpm
i386:
irb-1.6.8-13.el3.i386.rpm
ruby-1.6.8-13.el3.i386.rpm
ruby-devel-1.6.8-13.el3.i386.rpm
ruby-docs-1.6.8-13.el3.i386.rpm
ruby-libs-1.6.8-13.el3.i386.rpm
ruby-mode-1.6.8-13.el3.i386.rpm
ruby-tcltk-1.6.8-13.el3.i386.rpm
x86_64:
irb-1.6.8-13.el3.x86_64.rpm
ruby-1.6.8-13.el3.x86_64.rpm
ruby-devel-1.6.8-13.el3.x86_64.rpm
ruby-docs-1.6.8-13.el3.x86_64.rpm
ruby-libs-1.6.8-13.el3.i386.rpm
ruby-libs-1.6.8-13.el3.x86_64.rpm
ruby-mode-1.6.8-13.el3.x86_64.rpm
ruby-tcltk-1.6.8-13.el3.x86_64.rpm
SL 4.x
SRPMS:
ruby-1.8.1-7.el4_7.1.src.rpm
i386:
irb-1.8.1-7.el4_7.1.i386.rpm
ruby-1.8.1-7.el4_7.1.i386.rpm
ruby-devel-1.8.1-7.el4_7.1.i386.rpm
ruby-docs-1.8.1-7.el4_7.1.i386.rpm
ruby-libs-1.8.1-7.el4_7.1.i386.rpm
ruby-mode-1.8.1-7.el4_7.1.i386.rpm
ruby-tcltk-1.8.1-7.el4_7.1.i386.rpm
x86_64:
irb-1.8.1-7.el4_7.1.x86_64.rpm
ruby-1.8.1-7.el4_7.1.x86_64.rpm
ruby-devel-1.8.1-7.el4_7.1.x86_64.rpm
ruby-docs-1.8.1-7.el4_7.1.x86_64.rpm
ruby-libs-1.8.1-7.el4_7.1.i386.rpm
ruby-libs-1.8.1-7.el4_7.1.x86_64.rpm
ruby-mode-1.8.1-7.el4_7.1.x86_64.rpm
ruby-tcltk-1.8.1-7.el4_7.1.x86_64.rpm
SL 5.x
SRPMS:
ruby-1.8.5-5.el5_2.5.src.rpm
i386:
ruby-1.8.5-5.el5_2.5.i386.rpm
ruby-devel-1.8.5-5.el5_2.5.i386.rpm
ruby-docs-1.8.5-5.el5_2.5.i386.rpm
ruby-irb-1.8.5-5.el5_2.5.i386.rpm
ruby-libs-1.8.5-5.el5_2.5.i386.rpm
ruby-mode-1.8.5-5.el5_2.5.i386.rpm
ruby-rdoc-1.8.5-5.el5_2.5.i386.rpm
ruby-ri-1.8.5-5.el5_2.5.i386.rpm
ruby-tcltk-1.8.5-5.el5_2.5.i386.rpm
x86_64:
ruby-1.8.5-5.el5_2.5.x86_64.rpm
ruby-devel-1.8.5-5.el5_2.5.i386.rpm
ruby-devel-1.8.5-5.el5_2.5.x86_64.rpm
ruby-docs-1.8.5-5.el5_2.5.x86_64.rpm
ruby-irb-1.8.5-5.el5_2.5.x86_64.rpm
ruby-libs-1.8.5-5.el5_2.5.i386.rpm
ruby-libs-1.8.5-5.el5_2.5.x86_64.rpm
ruby-mode-1.8.5-5.el5_2.5.x86_64.rpm
ruby-rdoc-1.8.5-5.el5_2.5.x86_64.rpm
ruby-ri-1.8.5-5.el5_2.5.x86_64.rpm
ruby-tcltk-1.8.5-5.el5_2.5.x86_64.rpm
-Connie Sieh
-Troy Dawson
|
|
|