Secunia Security Advisory - Mandriva has issued an update for ruby. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
e6b3659ff94d845d50852d3fb129aeccae11afcbf4e27882c70b542df339ae58
TITLE:
Mandriva update for ruby
SECUNIA ADVISORY ID:
SA19772
VERIFY ADVISORY:
http://secunia.com/advisories/19772/
CRITICAL:
Moderately critical
IMPACT:
DoS
WHERE:
>From remote
OPERATING SYSTEM:
Mandriva Linux 2006
http://secunia.com/product/9020/
DESCRIPTION:
Mandriva has issued an update for ruby. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
For more information:
SA16904
SOLUTION:
Apply updated packages.
-- Mandrivalinux 2006 --
3144dc749cdb9da398064c2cf34103fe
2006.0/RPMS/ruby-1.8.2-7.2.20060mdk.i586.rpm
1bf85e3cd1456dbda21fd95f1626b28f
2006.0/RPMS/ruby-devel-1.8.2-7.2.20060mdk.i586.rpm
80000d9bf73c957174c6ce8a7c637147
2006.0/RPMS/ruby-doc-1.8.2-7.2.20060mdk.i586.rpm
272d3970702ec07e44a0469d1f431380
2006.0/RPMS/ruby-tk-1.8.2-7.2.20060mdk.i586.rpm
5cd34c71849ac8eebe80c6389178a5a8
2006.0/SRPMS/ruby-1.8.2-7.2.20060mdk.src.rpm
-- Mandrivalinux 2006/X86_64 --
c032856335423079f3a68b7eeaeda281
x86_64/2006.0/RPMS/ruby-1.8.2-7.2.20060mdk.x86_64.rpm
aa44a1b8179d94c3ef4504d504fdb01b
x86_64/2006.0/RPMS/ruby-devel-1.8.2-7.2.20060mdk.x86_64.rpm
a409a90806495d8a074fa15d9191d053
x86_64/2006.0/RPMS/ruby-doc-1.8.2-7.2.20060mdk.x86_64.rpm
4a13e6ade495ac6c2d6068d88674d396
x86_64/2006.0/RPMS/ruby-tk-1.8.2-7.2.20060mdk.x86_64.rpm
5cd34c71849ac8eebe80c6389178a5a8
x86_64/2006.0/SRPMS/ruby-1.8.2-7.2.20060mdk.src.rpm
ORIGINAL ADVISORY:
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:079
OTHER REFERENCES:
SA16904:
http://secunia.com/advisories/16904/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------