Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-0909

Опубликовано: 28 июн. 2011
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2011-0909: ruby security update (MODERATE)

[1.8.5-19.el5_6.1]

  • Address CVE-2011-1004 'Symlink race condition by removing directory trees in fileutils module'
    • ruby-1.8.7-CVE-2011-1004.patch
  • Address CVE-2011-1005 'Untrusted codes able to modify arbitrary strings'
    • ruby-1.8.7-CVE-2011-1005.patch
  • Address CVE-2011-0188 'memory corruption in BigDecimal on 64bit platforms'
    • ruby-1.8.7-CVE-2011-0188.patch
  • Address CVE-CVE-2010-0541 'Ruby WEBrick javascript injection flaw'
    • ruby-1.8.7-CVE-2010-0541.patch
  • Address CVE-CVE-2009-4492 'ruby WEBrick log escape sequence'
    • ruby-1.8.6-CVE-2009-4492.patch
  • Resolves: rhbz#709957

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

ruby

1.8.5-19.el5_6.1

ruby-devel

1.8.5-19.el5_6.1

ruby-docs

1.8.5-19.el5_6.1

ruby-irb

1.8.5-19.el5_6.1

ruby-libs

1.8.5-19.el5_6.1

ruby-mode

1.8.5-19.el5_6.1

ruby-rdoc

1.8.5-19.el5_6.1

ruby-ri

1.8.5-19.el5_6.1

ruby-tcltk

1.8.5-19.el5_6.1

Oracle Linux x86_64

ruby

1.8.5-19.el5_6.1

ruby-devel

1.8.5-19.el5_6.1

ruby-docs

1.8.5-19.el5_6.1

ruby-irb

1.8.5-19.el5_6.1

ruby-libs

1.8.5-19.el5_6.1

ruby-mode

1.8.5-19.el5_6.1

ruby-rdoc

1.8.5-19.el5_6.1

ruby-ri

1.8.5-19.el5_6.1

ruby-tcltk

1.8.5-19.el5_6.1

Oracle Linux i386

ruby

1.8.5-19.el5_6.1

ruby-devel

1.8.5-19.el5_6.1

ruby-docs

1.8.5-19.el5_6.1

ruby-irb

1.8.5-19.el5_6.1

ruby-libs

1.8.5-19.el5_6.1

ruby-mode

1.8.5-19.el5_6.1

ruby-rdoc

1.8.5-19.el5_6.1

ruby-ri

1.8.5-19.el5_6.1

ruby-tcltk

1.8.5-19.el5_6.1

Связанные уязвимости

oracle-oval
почти 14 лет назад

ELSA-2011-0910: ruby security update (MODERATE)

ubuntu
больше 15 лет назад

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

redhat
больше 15 лет назад

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

nvd
больше 15 лет назад

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

debian
больше 15 лет назад

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patc ...