Public bug reported: Binary package hint: ruby1.8
A vulnerability on the net/https library was reported. Detailed information should be found at the original advisory: <URL:http://www.isecpartners.com/advisories/2007-006-rubyssl.txt> Impact The vulnerability exists in the connect method within http.rb file which fails to call post_connection_check after the SSL connection has been negotiated. Since the server certificate's CN is not validated against the requested DNS name, the attacker can impersonate the target server in a SSL connection. The integrity and confidentiality benefits of SSL are thereby eliminated. Vulnerable versions 1.8 series * 1.8.4 and all prior versions * 1.8.5-p113 and all prior versions * 1.8.6-p110 and all prior versions Development version (1.9 series) All versions before 2006-09-23 Solution 1.8 series Please upgrade to 1.8.6-p111 or 1.8.5-p114. * <URL:http://ftp.ruby- lang.org/pub/ruby/1.8/ruby-1.8.6-p111.tar.gz> * <URL:http://ftp.ruby- lang.org/pub/ruby/1.8/ruby-1.8.5-p114.tar.gz> Please note that a package that corrects this weakness may already be available through your package management software. Development version (1.9 series) Please update your Ruby to a version after 2006-09-23. ** Affects: ruby1.8 (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public -- Net::HTTPS Vulnerability https://bugs.launchpad.net/bugs/149616 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs