Описание
ELSA-2013-1090: ruby security update (MODERATE)
[1.8.7.352-12]
- Fix regression introduced by CVE-2013-4073
https://bugs.ruby-lang.org/issues/8575
- ruby-2.0.0-p255-Fix-SSL-client-connection-crash-for-SAN-marked-critical.patch
- Related: rhbz#979300
[1.8.7.352-11]
- hostname check bypassing vulnerability in SSL client.
- ruby-1.8.7-p374-CVE-2013-4073-fix-hostname-verification.patch
- Resolves: rhbz#979300
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
ruby
1.8.5-31.el5_9
ruby-devel
1.8.5-31.el5_9
ruby-docs
1.8.5-31.el5_9
ruby-irb
1.8.5-31.el5_9
ruby-libs
1.8.5-31.el5_9
ruby-mode
1.8.5-31.el5_9
ruby-rdoc
1.8.5-31.el5_9
ruby-ri
1.8.5-31.el5_9
ruby-tcltk
1.8.5-31.el5_9
Oracle Linux x86_64
ruby
1.8.5-31.el5_9
ruby-devel
1.8.5-31.el5_9
ruby-docs
1.8.5-31.el5_9
ruby-irb
1.8.5-31.el5_9
ruby-libs
1.8.5-31.el5_9
ruby-mode
1.8.5-31.el5_9
ruby-rdoc
1.8.5-31.el5_9
ruby-ri
1.8.5-31.el5_9
ruby-tcltk
1.8.5-31.el5_9
Oracle Linux i386
ruby
1.8.5-31.el5_9
ruby-devel
1.8.5-31.el5_9
ruby-docs
1.8.5-31.el5_9
ruby-irb
1.8.5-31.el5_9
ruby-libs
1.8.5-31.el5_9
ruby-mode
1.8.5-31.el5_9
ruby-rdoc
1.8.5-31.el5_9
ruby-ri
1.8.5-31.el5_9
ruby-tcltk
1.8.5-31.el5_9
Oracle Linux 6
Oracle Linux x86_64
ruby
1.8.7.352-12.el6_4
ruby-devel
1.8.7.352-12.el6_4
ruby-docs
1.8.7.352-12.el6_4
ruby-irb
1.8.7.352-12.el6_4
ruby-libs
1.8.7.352-12.el6_4
ruby-rdoc
1.8.7.352-12.el6_4
ruby-ri
1.8.7.352-12.el6_4
ruby-static
1.8.7.352-12.el6_4
ruby-tcltk
1.8.7.352-12.el6_4
Oracle Linux i686
ruby
1.8.7.352-12.el6_4
ruby-devel
1.8.7.352-12.el6_4
ruby-docs
1.8.7.352-12.el6_4
ruby-irb
1.8.7.352-12.el6_4
ruby-libs
1.8.7.352-12.el6_4
ruby-rdoc
1.8.7.352-12.el6_4
ruby-ri
1.8.7.352-12.el6_4
ruby-static
1.8.7.352-12.el6_4
ruby-tcltk
1.8.7.352-12.el6_4
Связанные CVE
Связанные уязвимости
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/s ...
The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.