Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 4 Dec 2006 02:59:23 GMT
From:      UEDA Hiroyuki<bsdmad@gmail.com>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/106287: ruby-1.8.5-p2 released
Message-ID:  <200612040259.kB42xNkm044195@www.freebsd.org>
Resent-Message-ID: <200612040300.kB430P2S082381@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         106287
>Category:       ports
>Synopsis:       ruby-1.8.5-p2 released
>Confidential:   no
>Severity:       critical
>Priority:       high
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Mon Dec 04 03:00:24 GMT 2006
>Closed-Date:
>Last-Modified:
>Originator:     UEDA Hiroyuki
>Release:        6.2-RC1
>Organization:
>Environment:
FreeBSD fb5-stable.netforest.co.jp 6.2-RC1 FreeBSD 6.2-RC1 #25: Mon Nov 20 14:57:59 JST 2006     root@fb5-stable.netforest.co.jp:/usr/obj/usr/src/sys/STABLE  i386
>Description:
Ruby development team has announced that they rleased ruby-1.8.5-p2 because of security vulnerabilities in lib/cgi.rb. You can see the detail with following URL.

http://www.ruby-lang.org/en/news/2006/12/04/another-dos-vulnerability-in-cgi-library

I did sent-pr(http://www.freebsd.org/cgi/query-pr.cgi?pr=ports/105113) and fixed it in current ports, but there is another vulnerability which was not fixed by previous patch.


You can obtain latest tar archive from:

http://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.5-p2.tar.gz
>How-To-Repeat:

>Fix:
For fixing this problem, you need to upgrade 1.8.5-p2.

You can obtain latest release from following URL:

http://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.5-p2.tar.gz
>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200612040259.kB42xNkm044195>