USN-1902-1: Ruby vulnerability
9 July 2013
An attacker could trick Ruby into trusting a rogue server.
Releases
Packages
Details
William (B.J.) Snow Orvis discovered that Ruby incorrectly verified the
hostname in SSL certificates. An attacker could trick Ruby into trusting a
rogue server certificate, which was signed by a trusted certificate
authority, to perform a machine-in-the-middle attack.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 13.04
-
libruby1.8
-
1.8.7.358-7ubuntu1.1
-
libruby1.9.1
-
1.9.3.194-8.1ubuntu1.1
-
ruby1.8
-
1.8.7.358-7ubuntu1.1
-
ruby1.9.1
-
1.9.3.194-8.1ubuntu1.1
Ubuntu 12.10
-
libruby1.8
-
1.8.7.358-4ubuntu0.3
-
libruby1.9.1
-
1.9.3.194-1ubuntu1.5
-
ruby1.8
-
1.8.7.358-4ubuntu0.3
-
ruby1.9.1
-
1.9.3.194-1ubuntu1.5
Ubuntu 12.04
-
libruby1.8
-
1.8.7.352-2ubuntu1.3
-
libruby1.9.1
-
1.9.3.0-1ubuntu2.7
-
ruby1.8
-
1.8.7.352-2ubuntu1.3
-
ruby1.9.1
-
1.9.3.0-1ubuntu2.7
In general, a standard system update will make all the necessary changes.