what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Debian Linux Security Advisory 1651-1

Debian Linux Security Advisory 1651-1
Posted Oct 12, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1651-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which may lead to denial of service and other security problems.

tags | advisory, denial of service, vulnerability, ruby
systems | linux, debian
advisories | CVE-2008-3655, CVE-2008-3656, CVE-2008-3657, CVE-2008-3790, CVE-2008-3905
SHA-256 | 622633534482ea76ac0e2283e6d740db073afafaa57110c7c051ce14c16d2c3a

Debian Linux Security Advisory 1651-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1651-1 security@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
October 12, 2008 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : ruby1.8
Vulnerability : several
Problem-Type : local(remote)
Debian-specific: no
CVE ID : CVE-2008-3655 CVE-2008-3656 CVE-2008-3657 CVE-2008-3790 CVE-2008-3905

Several vulnerabilities have been discovered in the interpreter for
the Ruby language, which may lead to denial of service and other
security problems. The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2008-3655

Keita Yamaguchi discovered that several safe level restrictions
are insufficiently enforced.

CVE-2008-3656

Christian Neukirchen discovered that the WebRick module uses
inefficient algorithms for HTTP header splitting, resulting in
denial of service through resource exhaustion.

CVE-2008-3657

It was discovered that the dl module doesn't perform taintness
checks.

CVE-2008-3790

Luka Treiber and Mitja Kolsek discovered that recursively nested
XML entities can lead to denial of service through resource
exhaustion in rexml.

CVE-2008-3905

Tanaka Akira discovered that the resolv module uses sequential
transaction IDs and a fixed source port for DNS queries, which
makes it more vulnerable to DNS spoofing attacks.

For the stable distribution (etch), these problems have been fixed in
version 1.8.5-4etch3. Packages for arm will be provided later.

For the unstable distribution (sid), these problems have been fixed in
version 1.8.7.72-1.

We recommend that you upgrade your ruby1.8 packages.


Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5.orig.tar.gz
Size/MD5 checksum: 4434227 aae9676332fcdd52f66c3d99b289878f
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3.dsc
Size/MD5 checksum: 1079 4c7df61bd710db620b87ae0a3b98d388
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3.diff.gz
Size/MD5 checksum: 142603 f7c9366a3e04f00f5d4e7deb5d27eaf9

Architecture independent packages:

http://security.debian.org/pool/updates/main/r/ruby1.8/ri1.8_1.8.5-4etch3_all.deb
Size/MD5 checksum: 1241006 d8312745f5bf656d950323c6c9761e1e
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-elisp_1.8.5-4etch3_all.deb
Size/MD5 checksum: 211002 1b5eefc0ee08f8224b14e9cc887c408e
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-examples_1.8.5-4etch3_all.deb
Size/MD5 checksum: 245020 e16a6c9adf8603359b5031e46185bf25
http://security.debian.org/pool/updates/main/r/ruby1.8/irb1.8_1.8.5-4etch3_all.deb
Size/MD5 checksum: 235612 69142939deabd04310455bb13f288c66
http://security.debian.org/pool/updates/main/r/ruby1.8/rdoc1.8_1.8.5-4etch3_all.deb
Size/MD5 checksum: 310244 e321a815c462f98b404b8c1665d1b55f

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_alpha.deb
Size/MD5 checksum: 903552 ad6a8ddd2bf50091f4379509c7b6cef4
http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_alpha.deb
Size/MD5 checksum: 1869012 1a2090d92784326905495c96fe508bf2
http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_alpha.deb
Size/MD5 checksum: 198226 b11408bce9fbb392955416fb76d3f6b8
http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_alpha.deb
Size/MD5 checksum: 199160 e087c534968b3ee42d5c1a8eb271ffb0
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_alpha.deb
Size/MD5 checksum: 1638944 58b67c19df5d4394619792d1b8b40c03
http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_alpha.deb
Size/MD5 checksum: 199128 5ff5a9ca775487dcd3eb6d1e1d4eb180
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_alpha.deb
Size/MD5 checksum: 219386 d12ee43d6a3f38b98852fedc2349d3d5
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_alpha.deb
Size/MD5 checksum: 1075242 ce403140ff57e22f5260226ff3d9325c
http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_alpha.deb
Size/MD5 checksum: 301056 98e0e061f488d2b111f032a19d5a1060

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_amd64.deb
Size/MD5 checksum: 1068652 90b93dcde06d9ddcdee05ace2c42bb9e
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_amd64.deb
Size/MD5 checksum: 217282 f7c81dbf89b107a334ecd4bb4da66ba6
http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_amd64.deb
Size/MD5 checksum: 198082 006299a09bf2074c481322dfbce9dfe6
http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_amd64.deb
Size/MD5 checksum: 302902 6ef6a2d83f8b158b62ea62f3c4bba3fa
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_amd64.deb
Size/MD5 checksum: 1586654 9d7b4530804e8089a08a95c39bdeabbe
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_amd64.deb
Size/MD5 checksum: 748606 c07117a39289e01786fb9ee7a27a1829
http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_amd64.deb
Size/MD5 checksum: 1864338 a6e21b1b7dca462d5fb45689fe092150
http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_amd64.deb
Size/MD5 checksum: 197638 f6bb914b21492cf68cb1c4558e4ac644
http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_amd64.deb
Size/MD5 checksum: 198694 4757a7c9b578208d761fe2ccdce3fa41

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_hppa.deb
Size/MD5 checksum: 200220 2d8704ff62159bb1e8c2fc635e9cb3b5
http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_hppa.deb
Size/MD5 checksum: 199810 4e51aa246f1602dec04095780c0f5170
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_hppa.deb
Size/MD5 checksum: 1677464 394c17e4c1e40082701773314c3310e0
http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_hppa.deb
Size/MD5 checksum: 1869130 04510cbc8347e4cd055f22b11a26b234
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_hppa.deb
Size/MD5 checksum: 824102 b40a7f34f9401e1461f2211c904d3153
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_hppa.deb
Size/MD5 checksum: 1042102 f7f16a8ffb6be3a6a874b49be5904da8
http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_hppa.deb
Size/MD5 checksum: 316154 82f7dcc15c9ef9c542b12830910c72d4
http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_hppa.deb
Size/MD5 checksum: 199118 6c2239c266c6e7653449780d6ab18f71
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_hppa.deb
Size/MD5 checksum: 219164 2ad50197b6cf436a728c5b615a52a046

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_i386.deb
Size/MD5 checksum: 999668 64201f397337b7478893c08afc261e00
http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_i386.deb
Size/MD5 checksum: 293708 2327aefddae4e2dd58e9387e36a3934c
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_i386.deb
Size/MD5 checksum: 219408 e3cef11245e5554bef15f5598df21a8f
http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_i386.deb
Size/MD5 checksum: 197598 56ccc12092d5296e8156c1bc4f411119
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_i386.deb
Size/MD5 checksum: 719716 329bf36bc69b73ac908d6131e12a9933
http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_i386.deb
Size/MD5 checksum: 198252 e5df4a73eea74976f81949cfc085c722
http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_i386.deb
Size/MD5 checksum: 1856646 f839ef877cc1d905f20868ac29d8c6d6
http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_i386.deb
Size/MD5 checksum: 197916 221e994fe9132b0121ae1c1aef4d1a71
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_i386.deb
Size/MD5 checksum: 1534674 aff183539b7a3ffb37078d263b4c0fc4

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_ia64.deb
Size/MD5 checksum: 201426 7700f382729ccb1bf36b7361eda4e1e6
http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_ia64.deb
Size/MD5 checksum: 330536 de290038777d785a40b96ecde67bcb79
http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_ia64.deb
Size/MD5 checksum: 202400 425437ebd7a25ddcc24f0b00643e0e15
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_ia64.deb
Size/MD5 checksum: 971614 157129fd20a8e99bb060eb16d04b9b1e
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_ia64.deb
Size/MD5 checksum: 1895636 42981c9c01f3bfe0c29d9c89c67456ea
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_ia64.deb
Size/MD5 checksum: 218566 73418bc1a694edf6666a3bef64ab66b8
http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_ia64.deb
Size/MD5 checksum: 1861876 81df0b92b58078d1414bca3298a801fd
http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_ia64.deb
Size/MD5 checksum: 203346 861ceb05ebf6549fa2872f2f24eafdbd
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_ia64.deb
Size/MD5 checksum: 1026222 1c6b059f43c36a3d2195fb071a21c0c0

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_mips.deb
Size/MD5 checksum: 196588 0b12b7621be85e03e3ccf9bb8bf18252
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_mips.deb
Size/MD5 checksum: 802442 2a8e096b0bdec5cf68ca800bab083058
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_mips.deb
Size/MD5 checksum: 217920 f7ad5607292040314c621508996c10e3
http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_mips.deb
Size/MD5 checksum: 197376 ceef5241e870f21a04406000cfe861f7
http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_mips.deb
Size/MD5 checksum: 281460 585fe80dfa9e975314e6df5ec9f35490
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_mips.deb
Size/MD5 checksum: 1085282 94a0aa16383ec7f2ab88d742cead73c2
http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_mips.deb
Size/MD5 checksum: 1850952 26828e1d9dc0b6d24cfc9a8f5ea1bb33
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_mips.deb
Size/MD5 checksum: 1540352 a1c65ec2cd909491de849c9907d2eabc
http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_mips.deb
Size/MD5 checksum: 197514 118cfb3032dd4b79691ba0f79341bcc4

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_mipsel.deb
Size/MD5 checksum: 197666 42073374de4e32b274d2a485896d0734
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_mipsel.deb
Size/MD5 checksum: 1060018 eb935e3e4592e2ac723b87227258526a
http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_mipsel.deb
Size/MD5 checksum: 279206 21f76e4afe491f2ceaaa90215e2e6dab
http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_mipsel.deb
Size/MD5 checksum: 198014 6ec3efd9b594a9cc2759d95b61f2a64a
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_mipsel.deb
Size/MD5 checksum: 1538558 725d0012a98297cc4ae2c2aa6d76e73f
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_mipsel.deb
Size/MD5 checksum: 218098 a75856178c8addc09ae0db8dd8349b88
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_mipsel.deb
Size/MD5 checksum: 793332 fff033a8fde91eeaa458f2be3252a7bf
http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_mipsel.deb
Size/MD5 checksum: 1830324 a816a6d7bb2059cead4d5be647e66c03
http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_mipsel.deb
Size/MD5 checksum: 197072 cc83f3923ec214e99dfb87552813e524

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_powerpc.deb
Size/MD5 checksum: 219368 5033aca578c0a97d044b136adf2120d2
http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_powerpc.deb
Size/MD5 checksum: 293966 13f4c179f750c4ef69229f5f8c714908
http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_powerpc.deb
Size/MD5 checksum: 199990 900f11656f1bbfb7143c96eb6eca55b2
http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_powerpc.deb
Size/MD5 checksum: 199672 b36fcd86eae4a996aceea9f51ed82b6f
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_powerpc.deb
Size/MD5 checksum: 1592660 53543d9b925d742e2dd0bb21842d9484
http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_powerpc.deb
Size/MD5 checksum: 199450 7eecb4e14d914ef9ce18297dafeb4beb
http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_powerpc.deb
Size/MD5 checksum: 1837328 fc2549416dba4e379f56755dc11cf3d5
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_powerpc.deb
Size/MD5 checksum: 1108684 93123428d72447a94854d3ffa7feba05
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_powerpc.deb
Size/MD5 checksum: 718932 c59ae18feb43ed2dca6300adabb1a9e4

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_s390.deb
Size/MD5 checksum: 305246 14e3e5cddc2398095a39f5e7db03d50d
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_s390.deb
Size/MD5 checksum: 779454 22db8f14e5f3524693854a896d25dc73
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_s390.deb
Size/MD5 checksum: 1620164 25eb518ccfa74c490cd894a96d464743
http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_s390.deb
Size/MD5 checksum: 199400 7f87e9c92d21d9f0cc27168c15b09e90
http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_s390.deb
Size/MD5 checksum: 198604 f9b34b538bd4fae60bf1cfd357d78977
http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_s390.deb
Size/MD5 checksum: 198918 8e6b256da2d93404909bffaf9741cb8a
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_s390.deb
Size/MD5 checksum: 217956 e0603b2614b4402e24763265af2a69aa
http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_s390.deb
Size/MD5 checksum: 1838970 5eb6c09970d3a051d6fe1753893c7222
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_s390.deb
Size/MD5 checksum: 1051972 d10d44795254610d6f4becff47d5c3a7

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch3_sparc.deb
Size/MD5 checksum: 961570 c65f0632dc01bc50d209487741fc41f4
http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch3_sparc.deb
Size/MD5 checksum: 1833402 426ef4a80f6c366231813b596c9bf46f
http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch3_sparc.deb
Size/MD5 checksum: 197920 006e1097f7fdc7ac9a8b89413a56f2fe
http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch3_sparc.deb
Size/MD5 checksum: 1543240 4c4c3f00fd078b2fa6778a3245569e87
http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch3_sparc.deb
Size/MD5 checksum: 197144 2cd715ed20b9c63c0c264adb6ed1c000
http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch3_sparc.deb
Size/MD5 checksum: 197866 71c08be787f0a4f683b91fc539ade3c3
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch3_sparc.deb
Size/MD5 checksum: 741182 9c970b4ccbba6cba80d8284218d33ef4
http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch3_sparc.deb
Size/MD5 checksum: 296052 9567adab606aecadbee3006a572f0965
http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch3_sparc.deb
Size/MD5 checksum: 217898 b375854870d898692db953c88bf80e53


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkjxxBAACgkQXm3vHE4uylpcNACfQ5fkftyAQ4otRojzpcK3Ivd3
s6sAoIQ8WLQvmkGCcX9MHU13dHm7ynkd
=QiiP
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close