USN-596-1: Ruby vulnerabilities

26 March 2008

ruby1.8 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06 LTS

Software Description

  • ruby1.8

Details

Chris Clark discovered that Ruby’s HTTPS module did not check for commonName mismatches early enough during SSL negotiation. If a remote attacker were able to perform man-in-the-middle attacks, this flaw could be exploited to view sensitive information in HTTPS requests coming from Ruby applications. (CVE-2007-5162)

It was discovered that Ruby’s FTPTLS, telnets, and IMAPS modules did not check the commonName when performing SSL certificate checks. If a remote attacker were able to perform man-in-the-middle attacks, this flaw could be exploited to eavesdrop on encrypted communications from Ruby applications using these protocols. (CVE-2007-5770)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 7.10
libopenssl-ruby1.8 - 1.8.6.36-1ubuntu3.1
libruby1.8 - 1.8.6.36-1ubuntu3.1
Ubuntu 7.04
libopenssl-ruby1.8 - 1.8.5-4ubuntu2.1
libruby1.8 - 1.8.5-4ubuntu2.1
Ubuntu 6.10
libopenssl-ruby1.8 - 1.8.4-5ubuntu1.3
libruby1.8 - 1.8.4-5ubuntu1.3
Ubuntu 6.06 LTS
libopenssl-ruby1.8 - 1.8.4-1ubuntu1.4
libruby1.8 - 1.8.4-1ubuntu1.4

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References