ruby1.9.1 (1.9.3.484-2ubuntu1.3) trusty-security; urgency=medium
* SECURITY UPDATE: DoS and possible code execution in DL::dlopen
- debian/patches/CVE-2009-5147.patch: check tainted string arguments in
ext/dl/handle.c.
- CVE-2009-5147
* SECURITY UPDATE: incorrect hostname matching
- debian/patches/CVE-2015-1855.patch: implement stricter hostname
validation per RFC 6125 in ext/openssl/lib/openssl/ssl-internal.rb,
added tests to test/openssl/test_ssl.rb.
- CVE-2015-1855
* SECURITY UPDATE: SMTP command injection
- debian/patches/CVE-2015-9096.patch: don't allow bare CR or LF in
lib/net/smtp.rb, added test to test/net/smtp/test_smtp.rb.
- CVE-2015-9096
* SECURITY UPDATE: type confusion in tcltkip
- debian/patches/CVE-2016-2337.patch: check argument in
ext/tk/tcltklib.c.
- CVE-2016-2337
* SECURITY UPDATE: heap overflow in Fiddle::Function.new
- debian/patches/CVE-2016-2339.patch: check arguments in
ext/fiddle/function.c.
- CVE-2016-2339
* SECURITY UPDATE: use of same initialization vector (IV)
- debian/patches/CVE-2016-7798.patch: don't set dummy key in
ext/openssl/ossl_cipher.c, added test to test/openssl/test_cipher.rb.
- CVE-2016-7798
-- Marc Deslauriers <email address hidden> Tue, 20 Jun 2017 08:03:20 -0400