---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Ubuntu update for ruby1.9 SECUNIA ADVISORY ID: SA33185 VERIFY ADVISORY: http://secunia.com/advisories/33185/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Ubuntu Linux 8.10 http://secunia.com/advisories/product/20299/ DESCRIPTION: Ubuntu has issued an update for ruby1.9. This fixes a vulnerability, which can potentially be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA31430 NOTE: This also fixes a regression in the patch to fix CVE-2008-3790, which can cause the parsing of some XML documents to fail. SOLUTION: Apply updated packages. -- Ubuntu 8.10 -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1.diff.gz Size/MD5: 49454 02828291d0b8db94d06dbc6be804b58b http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1.dsc Size/MD5: 1771 5d3434eeadde20df96b78b4a959112f2 http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2.orig.tar.gz Size/MD5: 6407910 2a848b81ed1d6393b88eec8aa6173b75 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/irb1.9_1.9.0.2-7ubuntu1.1_all.deb Size/MD5: 57440 7c3c984736fd87485a9dfa0e8065afcc http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/rdoc1.9_1.9.0.2-7ubuntu1.1_all.deb Size/MD5: 112262 a2afb0c815463a14b51eff6199d10661 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ri1.9_1.9.0.2-7ubuntu1.1_all.deb Size/MD5: 971786 57646618dddada4562990b3eb1c787b6 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ruby1.9-elisp_1.9.0.2-7ubuntu1.1_all.deb Size/MD5: 31094 4e2ac93f161570ff11b5d39d5912bfce http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/ruby1.9-examples_1.9.0.2-7ubuntu1.1_all.deb Size/MD5: 64354 8a9aca7db601358141fd19d85ea45751 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_amd64.deb Size/MD5: 2113618 bc410c5116879cd05234451e2fbc1447 http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb Size/MD5: 2275308 5863e492367db5313ac068c5dde703e9 http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_amd64.deb Size/MD5: 943252 1c8a27569a60edf9e4aabb7b7716967f http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb Size/MD5: 26536 86aa87a261a57d1d67edb397671b20b4 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb Size/MD5: 12544 eeb030e448f92081b3c05fe696011142 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb Size/MD5: 11838 b8c61c3b7435de2752b46bb75331ca3c http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb Size/MD5: 134340 258bed110d062a4b96b02b558b08a412 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb Size/MD5: 11638 6e3898a64f7dcccf444be54599313a17 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_amd64.deb Size/MD5: 1745708 58a02a0dfa5d27ff0bb011acb635ed80 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_i386.deb Size/MD5: 1921126 690079b204fc118f99876ed462371de5 http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_i386.deb Size/MD5: 2127706 3dd6e4cd3c8adf46db14d45574ffd0ec http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_i386.deb Size/MD5: 889504 c2fe2150cb1c8a15f855c42a52c424ef http://security.ubuntu.com/ubuntu/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb Size/MD5: 26324 97f33c71e37213e31af3e400e3687a9d http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb Size/MD5: 11186 4f749b40168d0b0235d49082b981694f http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb Size/MD5: 10598 44b212294eb892c174bde278bb9e97cb http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb Size/MD5: 118168 178e91fd4562e351835bfb9902ba4c61 http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb Size/MD5: 10818 8c041f2499bb45935b185e82a8e40b3a http://security.ubuntu.com/ubuntu/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_i386.deb Size/MD5: 1738394 8c37885e72e5f00d7b4281885478bc6c lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_lpia.deb Size/MD5: 1951024 4f5e0733a3f49d53ca008ffcecf0c2de http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb Size/MD5: 2105434 535e2f90d7471df4fbdb766e48bf8c91 http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_lpia.deb Size/MD5: 874130 473f3817d976736b04d4237e179a9c6f http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb Size/MD5: 26300 6d016c54f454eb4654facd88c1ae0a13 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb Size/MD5: 11248 44a9b7e75e49660021284d7d6604ccff http://ports.ubuntu.com/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb Size/MD5: 10420 4f3e626250d8d16256e771135f80f4f4 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb Size/MD5: 117570 b62300ef68d2655d837a0aed5d0bd054 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb Size/MD5: 10746 a82cc7f12682aba7b583ec86cd13f55e http://ports.ubuntu.com/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_lpia.deb Size/MD5: 1737900 60a1f240342ab4ec317c1c0cf9c6e288 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_powerpc.deb Size/MD5: 2091776 d37a509a3fc9bcbc145e645f7766f269 http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb Size/MD5: 2243518 af2e9a1ec3ca58e27f1f450d73fd9610 http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_powerpc.deb Size/MD5: 901944 a7d7281252ec2325d634dd9857a80159 http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb Size/MD5: 28734 0ecd088dcfe450dc224550ff4cb2846a http://ports.ubuntu.com/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb Size/MD5: 14040 e5d5eb44f95ab85d5219a98e1ef3ae37 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb Size/MD5: 13318 e7e41a81b7155e3a8ab28f0905b0d084 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb Size/MD5: 133012 25e742b2556294b87f8563be9f622f56 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb Size/MD5: 13556 f1f4a0574e284023b1734d48db0f19c8 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_powerpc.deb Size/MD5: 1747252 33ef64fd198e65ee8919e8409aaea08d sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9-dbg_1.9.0.2-7ubuntu1.1_sparc.deb Size/MD5: 1803982 09d9b480b214361a46549de31f99e849 http://ports.ubuntu.com/pool/main/r/ruby1.9/libruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb Size/MD5: 2109258 731ae4bcad17cf2f0fa70a3bbc0ed490 http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9-dev_1.9.0.2-7ubuntu1.1_sparc.deb Size/MD5: 883296 2ee2efc0f3c6d42bbc3ef765e346bd7b http://ports.ubuntu.com/pool/main/r/ruby1.9/ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb Size/MD5: 26526 b2af0ad31ed80fa28cbdd24f5fabe6b7 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libdbm-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb Size/MD5: 11212 c6dd5248b2680527df86081bbd7f58cc http://ports.ubuntu.com/pool/universe/r/ruby1.9/libgdbm-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb Size/MD5: 10430 e24df579da217e1a47a2d7010c9408f9 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libopenssl-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb Size/MD5: 124360 52fbc1543bdc80153b92113320a324c5 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libreadline-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb Size/MD5: 10856 504a25a03a0a79818536e0f967b4b904 http://ports.ubuntu.com/pool/universe/r/ruby1.9/libtcltk-ruby1.9_1.9.0.2-7ubuntu1.1_sparc.deb Size/MD5: 1740490 df138fac9cfb1d0b5cbab685e8738167 ORIGINAL ADVISORY: http://www.ubuntu.com/usn/USN-691-1 OTHER REFERENCES: SA31430: http://secunia.com/advisories/31430/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------