This bug was fixed in the package ruby1.8 - 1.8.5-4ubuntu2.2
---------------
ruby1.8 (1.8.5-4ubuntu2.2) feisty-security; urgency=low
* SECURITY UPDATE: denial of service or arbitrary code execution via
integer overflows and memory corruption
* debian/patches/952_CVE-2008-2662+2663+2664+2725+2726.patch: update array.c
to properly validate the size of an array. Update string.c and sprintf.c
for proper bounds checking
* References:
CVE-2008-2662
CVE-2008-2663
CVE-2008-2664
CVE-2008-2725
CVE-2008-2726
LP: #241657
-- Jamie Strandboge <[EMAIL PROTECTED]> Wed, 25 Jun 2008 15:24:05
-0400
--
Multiple vulnerabilities in Ruby may lead to a denial of service (DoS)
condition or allow execution of arbitrary code.
https://bugs.launchpad.net/bugs/241657
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs