ruby2.0 (2.0.0.484-1ubuntu2.4) trusty-security; urgency=medium

  * SECURITY UPDATE: incorrect hostname matching
    - debian/patches/CVE-2015-1855.patch: implement stricter hostname
      validation per RFC 6125 in ext/openssl/lib/openssl/ssl.rb, added
      tests to test/openssl/test_ssl.rb.
    - CVE-2015-1855
  * SECURITY UPDATE: DoS and possible code execution in Fiddle::Handle
    - debian/patches/CVE-2015-7551.patch: check tainted string arguments in
      ext/fiddle/handle.c, added tests to test/fiddle/test_handle.rb.
    - CVE-2015-7551
  * SECURITY UPDATE: SMTP command injection
    - debian/patches/CVE-2015-9096.patch: don't allow bare CR or LF in
      lib/net/smtp.rb, added test to test/net/smtp/test_smtp.rb.
    - CVE-2015-9096
  * SECURITY UPDATE: type confusion in tcltkip
    - debian/patches/CVE-2016-2337.patch: check argument in
      ext/tk/tcltklib.c.
    - CVE-2016-2337
  * SECURITY UPDATE: heap overflow in Fiddle::Function.new
    - debian/patches/CVE-2016-2339.patch: check arguments in
      ext/fiddle/function.c.
    - CVE-2016-2339
  * SECURITY UPDATE: use of same initialization vector (IV)
    - debian/patches/CVE-2016-7798.patch: don't set dummy key in
      ext/openssl/ossl_cipher.c, added test to test/openssl/test_cipher.rb.
    - CVE-2016-7798
  * debian/rules: add note on enabling the full test suite
  * debian/patches/fix_tests.patch: fix some broken tests.

Date: 2017-06-20 18:47:15.731862+00:00
Changed-By: Marc Deslauriers <[email protected]>
Signed-By: Ubuntu Archive Robot 
<[email protected]>
https://launchpad.net/ubuntu/+source/ruby2.0/2.0.0.484-1ubuntu2.4
Sorry, changesfile not available.
-- 
Trusty-changes mailing list
[email protected]
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to