LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: August 29th, 2014
Linux Security Week: August 25th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: Subject: [Security Announce] [ MDVSA-2009:193 ] ruby Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate. This update corrects the problem, including for older ruby versions.
 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2009:193
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : ruby
 Date    : August 5, 2009
 Affected: 2008.1, 2009.0, 2009.1, Corporate 3.0, Corporate 4.0,
           Enterprise Server 5.0
 _______________________________________________________________________

 Problem Description:

 ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check
 the return value from the OCSP_basic_verify function, which might allow
 remote attackers to successfully present an invalid X.509 certificate,
 possibly involving a revoked certificate.
 
 This update corrects the problem, including for older ruby versions.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0642
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 b6713b937acd6177e43d5dd9adf78a92  2008.1/i586/ruby-1.8.6-9p114.4mdv2008.1.i586.rpm
 09481407505f55b81cade1db95d738c6  2008.1/i586/ruby-devel-1.8.6-9p114.4mdv2008.1.i586.rpm
 0308ccc0cb62ca9031c654c94cc0e9ee  2008.1/i586/ruby-doc-1.8.6-9p114.4mdv2008.1.i586.rpm
 a1f5fffec41efe72ce8976c8ef79a660  2008.1/i586/ruby-tk-1.8.6-9p114.4mdv2008.1.i586.rpm 
 4bbb4018722168d2ced70b7c107c6ea0  2008.1/SRPMS/ruby-1.8.6-9p114.4mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 6128ad00fe61fe921239487a3a7f9c2a  2008.1/x86_64/ruby-1.8.6-9p114.4mdv2008.1.x86_64.rpm
 a37e6862e77d34a6b8a511bdfb2a6d24  2008.1/x86_64/ruby-devel-1.8.6-9p114.4mdv2008.1.x86_64.rpm
 d47b51ac7bd9ce7233e607f1d3d1edc3  2008.1/x86_64/ruby-doc-1.8.6-9p114.4mdv2008.1.x86_64.rpm
 6b8503f890db07a56a602e5004dcde76  2008.1/x86_64/ruby-tk-1.8.6-9p114.4mdv2008.1.x86_64.rpm 
 4bbb4018722168d2ced70b7c107c6ea0  2008.1/SRPMS/ruby-1.8.6-9p114.4mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 a99dca894009b3416c947c9b918ca565  2009.0/i586/ruby-1.8.7-7p72.2mdv2009.0.i586.rpm
 ffdba0c2d07588a9d03e8b35b2bfdc62  2009.0/i586/ruby-devel-1.8.7-7p72.2mdv2009.0.i586.rpm
 a87ad8e2b9aa8a12e0d263a51d392abf  2009.0/i586/ruby-doc-1.8.7-7p72.2mdv2009.0.i586.rpm
 8603163c55d43873154a15f412cf9dc6  2009.0/i586/ruby-tk-1.8.7-7p72.2mdv2009.0.i586.rpm 
 643988677dc99d19e0f70907745edb64  2009.0/SRPMS/ruby-1.8.7-7p72.2mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 07840368d916f0d15f9c00e135f7c307  2009.0/x86_64/ruby-1.8.7-7p72.2mdv2009.0.x86_64.rpm
 b7e8a14de19e4898e3ee6396f6c2d073  2009.0/x86_64/ruby-devel-1.8.7-7p72.2mdv2009.0.x86_64.rpm
 ab0cf8b25ac28347827a8c09f1f0a6eb  2009.0/x86_64/ruby-doc-1.8.7-7p72.2mdv2009.0.x86_64.rpm
 539aecfa8e5cfc78b25551b64144ae44  2009.0/x86_64/ruby-tk-1.8.7-7p72.2mdv2009.0.x86_64.rpm 
 643988677dc99d19e0f70907745edb64  2009.0/SRPMS/ruby-1.8.7-7p72.2mdv2009.0.src.rpm

 Mandriva Linux 2009.1:
 8c79d647f56c69f4092db555f76f2fc0  2009.1/i586/ruby-1.8.7-9p72.2mdv2009.1.i586.rpm
 1de68e2e5913980856e94bb48776ccf6  2009.1/i586/ruby-devel-1.8.7-9p72.2mdv2009.1.i586.rpm
 2e25f7bee81951aa32c3cb22c235295e  2009.1/i586/ruby-doc-1.8.7-9p72.2mdv2009.1.i586.rpm
 87808e106da38245199b7fe1ce2df0a0  2009.1/i586/ruby-tk-1.8.7-9p72.2mdv2009.1.i586.rpm 
 a2d2afc50337c9e59faf07560d524acf  2009.1/SRPMS/ruby-1.8.7-9p72.2mdv2009.1.src.rpm

 Mandriva Linux 2009.1/X86_64:
 9fa5300ab40245ffb8a9324b6a508dd1  2009.1/x86_64/ruby-1.8.7-9p72.2mdv2009.1.x86_64.rpm
 e3d66178e2688a3ffa2474f51f06fdb0  2009.1/x86_64/ruby-devel-1.8.7-9p72.2mdv2009.1.x86_64.rpm
 f67eb8be42e770f0cab2bc27011cb914  2009.1/x86_64/ruby-doc-1.8.7-9p72.2mdv2009.1.x86_64.rpm
 daa9e7bdcef05e5184d7330f404aabe6  2009.1/x86_64/ruby-tk-1.8.7-9p72.2mdv2009.1.x86_64.rpm 
 a2d2afc50337c9e59faf07560d524acf  2009.1/SRPMS/ruby-1.8.7-9p72.2mdv2009.1.src.rpm

 Corporate 3.0:
 bb6f25ad3053954c969ff74fca117518  corporate/3.0/i586/ruby-1.8.1-1.13.C30mdk.i586.rpm
 ad4055c50ce8da0372d831e0b488af9c  corporate/3.0/i586/ruby-devel-1.8.1-1.13.C30mdk.i586.rpm
 13448c01625ca8b1b538aa5162d2c620  corporate/3.0/i586/ruby-doc-1.8.1-1.13.C30mdk.i586.rpm
 78451cec2892c715ace6ce09b75a4f07  corporate/3.0/i586/ruby-tk-1.8.1-1.13.C30mdk.i586.rpm 
 a235fb7168b3c327d4d6ae80290bdd6e  corporate/3.0/SRPMS/ruby-1.8.1-1.13.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 5d315613d9f992d6c4f58c52bd03d627  corporate/3.0/x86_64/ruby-1.8.1-1.13.C30mdk.x86_64.rpm
 d3b693c92ee4968e6f6d63e3b71e5a90  corporate/3.0/x86_64/ruby-devel-1.8.1-1.13.C30mdk.x86_64.rpm
 7f0ca0f79a7b9286cd98e2da2ba6c2b4  corporate/3.0/x86_64/ruby-doc-1.8.1-1.13.C30mdk.x86_64.rpm
 9f4cc39abd6d039223c80dfcc101e51f  corporate/3.0/x86_64/ruby-tk-1.8.1-1.13.C30mdk.x86_64.rpm 
 a235fb7168b3c327d4d6ae80290bdd6e  corporate/3.0/SRPMS/ruby-1.8.1-1.13.C30mdk.src.rpm

 Corporate 4.0:
 14eefde3ea5f870005dd4c0fb2025c8c  corporate/4.0/i586/ruby-1.8.2-7.10.20060mlcs4.i586.rpm
 e4b685717a138c661ca4f13ee4c00c12  corporate/4.0/i586/ruby-devel-1.8.2-7.10.20060mlcs4.i586.rpm
 e63feea2d4bd7b87be16335da05142a9  corporate/4.0/i586/ruby-doc-1.8.2-7.10.20060mlcs4.i586.rpm
 ccbefcfcf5c49233f2573ca89a60c687  corporate/4.0/i586/ruby-tk-1.8.2-7.10.20060mlcs4.i586.rpm 
 66356780c7aacc6ad849f4c87898de31  corporate/4.0/SRPMS/ruby-1.8.2-7.10.20060mlcs4.src.rpm

 Corporate 4.0/X86_64:
 ac7b9ff49f03f98310cdce61ca88d87f  corporate/4.0/x86_64/ruby-1.8.2-7.10.20060mlcs4.x86_64.rpm
 488c64e56c4b7c9cf1336c98436d492f  corporate/4.0/x86_64/ruby-devel-1.8.2-7.10.20060mlcs4.x86_64.rpm
 f487ec8a14a4b0690ae8f3337fc518cc  corporate/4.0/x86_64/ruby-doc-1.8.2-7.10.20060mlcs4.x86_64.rpm
 a5a8f90e1fbfd7dc680c9cd8827857c7  corporate/4.0/x86_64/ruby-tk-1.8.2-7.10.20060mlcs4.x86_64.rpm 
 66356780c7aacc6ad849f4c87898de31  corporate/4.0/SRPMS/ruby-1.8.2-7.10.20060mlcs4.src.rpm

 Mandriva Enterprise Server 5:
 89918bfc80df73ecbd918b78facac289  mes5/i586/ruby-1.8.7-7p72.2mdvmes5.i586.rpm
 342607d25b5573fb4e3193e3d74978df  mes5/i586/ruby-devel-1.8.7-7p72.2mdvmes5.i586.rpm
 49796832a7df2a8f26381bb6ff2525a0  mes5/i586/ruby-doc-1.8.7-7p72.2mdvmes5.i586.rpm
 54307ad3d0a7278bc520dad9e6861f86  mes5/i586/ruby-tk-1.8.7-7p72.2mdvmes5.i586.rpm 
 c53fadcd8cef5e5b80a4c85d8538a8a5  mes5/SRPMS/ruby-1.8.7-7p72.2mdvmes5.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 910d0b5fa5766311f5c5dd067f8faeef  mes5/x86_64/ruby-1.8.7-7p72.2mdvmes5.x86_64.rpm
 c970d0fed769ad331bfca522b7e5419f  mes5/x86_64/ruby-devel-1.8.7-7p72.2mdvmes5.x86_64.rpm
 5e5ec905b65a9e9635ef3d97d9783aa4  mes5/x86_64/ruby-doc-1.8.7-7p72.2mdvmes5.x86_64.rpm
 8d60e7dd804cf09d17d6e8a6360b01f1  mes5/x86_64/ruby-tk-1.8.7-7p72.2mdvmes5.x86_64.rpm 
 c53fadcd8cef5e5b80a4c85d8538a8a5  mes5/SRPMS/ruby-1.8.7-7p72.2mdvmes5.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
How Cops and Hackers Could Abuse California’s New Phone Kill-Switch Law
Why Russian hackers are beating us
DQ Breach? HQ Says No, But Would it Know?
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.