This bug was fixed in the package ruby1.8 - 1.8.6.111-2ubuntu1.1

---------------
ruby1.8 (1.8.6.111-2ubuntu1.1) hardy-security; urgency=low

  * SECURITY UPDATE: denial of service or arbitrary code execution via
    integer overflows and memory corruption
  * debian/patches/101_CVE-2008-2662+2663+2664+2725+2726.dpatch update array.c
    to properly validate the size of an array. Update string.c and sprintf.c
    for proper bounds checking
  * References:
    CVE-2008-2662
    CVE-2008-2663
    CVE-2008-2664
    CVE-2008-2725
    CVE-2008-2726
    LP: #241657

 -- Jamie Strandboge <[EMAIL PROTECTED]>   Wed, 25 Jun 2008 15:50:50
-0400

** Changed in: ruby1.8 (Ubuntu Hardy)
       Status: Fix Committed => Fix Released

** Changed in: ruby1.8 (Ubuntu Gutsy)
       Status: Fix Committed => Fix Released

-- 
Multiple vulnerabilities in Ruby may lead to a denial of service (DoS) 
condition or allow execution of arbitrary code.
https://bugs.launchpad.net/bugs/241657
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to