=========================================================================Ubuntu Security Notice USN-1902-1
July 09, 2013

ruby1.8, ruby1.9.1 vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS

Summary:

An attacker could trick Ruby into trusting a rogue server.

Software Description:
- ruby1.8: Object-oriented scripting language
- ruby1.9.1: Object-oriented scripting language

Details:

William (B.J.) Snow Orvis discovered that Ruby incorrectly verified the
hostname in SSL certificates. An attacker could trick Ruby into trusting a
rogue server certificate, which was signed by a trusted certificate
authority, to perform a man-in-the-middle attack.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
  libruby1.8                      1.8.7.358-7ubuntu1.1
  libruby1.9.1                    1.9.3.194-8.1ubuntu1.1
  ruby1.8                         1.8.7.358-7ubuntu1.1
  ruby1.9.1                       1.9.3.194-8.1ubuntu1.1

Ubuntu 12.10:
  libruby1.8                      1.8.7.358-4ubuntu0.3
  libruby1.9.1                    1.9.3.194-1ubuntu1.5
  ruby1.8                         1.8.7.358-4ubuntu0.3
  ruby1.9.1                       1.9.3.194-1ubuntu1.5

Ubuntu 12.04 LTS:
  libruby1.8                      1.8.7.352-2ubuntu1.3
  libruby1.9.1                    1.9.3.0-1ubuntu2.7
  ruby1.8                         1.8.7.352-2ubuntu1.3
  ruby1.9.1                       1.9.3.0-1ubuntu2.7

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-1902-1
  CVE-2013-4073

Package Information:
  https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.358-7ubuntu1.1
  https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.194-8.1ubuntu1.1
  https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.358-4ubuntu0.3
  https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.194-1ubuntu1.5
  https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.352-2ubuntu1.3
  https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.0-1ubuntu2.7


Ubuntu 1902-1: Ruby vulnerability

July 9, 2013
An attacker could trick Ruby into trusting a rogue server.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 13.04: libruby1.8 1.8.7.358-7ubuntu1.1 libruby1.9.1 1.9.3.194-8.1ubuntu1.1 ruby1.8 1.8.7.358-7ubuntu1.1 ruby1.9.1 1.9.3.194-8.1ubuntu1.1 Ubuntu 12.10: libruby1.8 1.8.7.358-4ubuntu0.3 libruby1.9.1 1.9.3.194-1ubuntu1.5 ruby1.8 1.8.7.358-4ubuntu0.3 ruby1.9.1 1.9.3.194-1ubuntu1.5 Ubuntu 12.04 LTS: libruby1.8 1.8.7.352-2ubuntu1.3 libruby1.9.1 1.9.3.0-1ubuntu2.7 ruby1.8 1.8.7.352-2ubuntu1.3 ruby1.9.1 1.9.3.0-1ubuntu2.7 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-1902-1

CVE-2013-4073

Severity
July 09, 2013

Package Information

https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.358-7ubuntu1.1 https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.194-8.1ubuntu1.1 https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.358-4ubuntu0.3 https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.194-1ubuntu1.5 https://launchpad.net/ubuntu/+source/ruby1.8/1.8.7.352-2ubuntu1.3 https://launchpad.net/ubuntu/+source/ruby1.9.1/1.9.3.0-1ubuntu2.7

Related News