Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2012-0070

Опубликовано: 30 янв. 2012
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2012-0070: ruby security update (MODERATE)

[1.8.5-22.1]

  • Properly initialize the random number generator when forking new process
    • ruby-1.8.7-CVE-2011-3009.patch
    • Related: rhbz#768829

[1.8.5-21.1]

  • Revert accidential move of tcl/tk libraries.
    • Related: rhbz#768829

[1.8.5-20.1]

  • Address CVE-2011-4815 "DoS (excessive CPU use) via hash meet-in-the-middle attacks (oCERT-2011-003)"
    • ruby-1.8.7-CVE-2011-4815.patch
    • Resolves: rhbz#768829

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

ruby

1.8.5-22.el5_7.1

ruby-devel

1.8.5-22.el5_7.1

ruby-docs

1.8.5-22.el5_7.1

ruby-irb

1.8.5-22.el5_7.1

ruby-libs

1.8.5-22.el5_7.1

ruby-mode

1.8.5-22.el5_7.1

ruby-rdoc

1.8.5-22.el5_7.1

ruby-ri

1.8.5-22.el5_7.1

ruby-tcltk

1.8.5-22.el5_7.1

Oracle Linux x86_64

ruby

1.8.5-22.el5_7.1

ruby-devel

1.8.5-22.el5_7.1

ruby-docs

1.8.5-22.el5_7.1

ruby-irb

1.8.5-22.el5_7.1

ruby-libs

1.8.5-22.el5_7.1

ruby-mode

1.8.5-22.el5_7.1

ruby-rdoc

1.8.5-22.el5_7.1

ruby-ri

1.8.5-22.el5_7.1

ruby-tcltk

1.8.5-22.el5_7.1

Oracle Linux i386

ruby

1.8.5-22.el5_7.1

ruby-devel

1.8.5-22.el5_7.1

ruby-docs

1.8.5-22.el5_7.1

ruby-irb

1.8.5-22.el5_7.1

ruby-libs

1.8.5-22.el5_7.1

ruby-mode

1.8.5-22.el5_7.1

ruby-rdoc

1.8.5-22.el5_7.1

ruby-ri

1.8.5-22.el5_7.1

ruby-tcltk

1.8.5-22.el5_7.1

Связанные CVE

Связанные уязвимости

ubuntu
больше 13 лет назад

Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

redhat
больше 13 лет назад

Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

nvd
больше 13 лет назад

Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.

debian
больше 13 лет назад

Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restri ...

ubuntu
около 14 лет назад

Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.