Описание
ELSA-2012-0070: ruby security update (MODERATE)
[1.8.5-22.1]
- Properly initialize the random number generator when forking new process
- ruby-1.8.7-CVE-2011-3009.patch
- Related: rhbz#768829
[1.8.5-21.1]
- Revert accidential move of tcl/tk libraries.
- Related: rhbz#768829
[1.8.5-20.1]
- Address CVE-2011-4815 "DoS (excessive CPU use) via hash meet-in-the-middle
attacks (oCERT-2011-003)"
- ruby-1.8.7-CVE-2011-4815.patch
- Resolves: rhbz#768829
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
ruby
1.8.5-22.el5_7.1
ruby-devel
1.8.5-22.el5_7.1
ruby-docs
1.8.5-22.el5_7.1
ruby-irb
1.8.5-22.el5_7.1
ruby-libs
1.8.5-22.el5_7.1
ruby-mode
1.8.5-22.el5_7.1
ruby-rdoc
1.8.5-22.el5_7.1
ruby-ri
1.8.5-22.el5_7.1
ruby-tcltk
1.8.5-22.el5_7.1
Oracle Linux x86_64
ruby
1.8.5-22.el5_7.1
ruby-devel
1.8.5-22.el5_7.1
ruby-docs
1.8.5-22.el5_7.1
ruby-irb
1.8.5-22.el5_7.1
ruby-libs
1.8.5-22.el5_7.1
ruby-mode
1.8.5-22.el5_7.1
ruby-rdoc
1.8.5-22.el5_7.1
ruby-ri
1.8.5-22.el5_7.1
ruby-tcltk
1.8.5-22.el5_7.1
Oracle Linux i386
ruby
1.8.5-22.el5_7.1
ruby-devel
1.8.5-22.el5_7.1
ruby-docs
1.8.5-22.el5_7.1
ruby-irb
1.8.5-22.el5_7.1
ruby-libs
1.8.5-22.el5_7.1
ruby-mode
1.8.5-22.el5_7.1
ruby-rdoc
1.8.5-22.el5_7.1
ruby-ri
1.8.5-22.el5_7.1
ruby-tcltk
1.8.5-22.el5_7.1
Связанные CVE
Связанные уязвимости
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restri ...
Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.