--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-17949
2012-11-10 19:30:40
--------------------------------------------------------------------------------

Name        : ruby
Product     : Fedora 18
Version     : 1.9.3.327
Release     : 22.fc18
URL         : http://ruby-lang.org/
Summary     : An interpreter of object-oriented scripting language
Description :
Ruby is the interpreted scripting language for quick and easy
object-oriented programming.  It has many features to process text
files and to do system management tasks (as in Perl).  It is simple,
straight-forward, and extensible.

--------------------------------------------------------------------------------
Update Information:

A security flaw was found on ruby currently shiped on Fedora 18 that carefully 
crafted sequence of strings may cause a denial of service attack on the service 
that parses the sequence to create a Hash object by using the strings as keys. 
This issue is now registered as CVE-2012-5371.

This new package should fix this issue.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #875268 - CVE-2012-5371 ruby: hash-flooding DoS flaw in ruby 1.9 
[fedora-18]
        https://bugzilla.redhat.com/show_bug.cgi?id=875268
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update ruby' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
[email protected]
https://admin.fedoraproject.org/mailman/listinfo/package-announce

Reply via email to