* SECURITY UPDATE: denial of service or arbitrary code execution via
integer overflows and memory corruption
* debian/patches/102_CVE-2008-2662+2663+2664+2725+2726.dpatch: update
array.c to properly validate the size of an array. Update string.c and
sprintf.c for proper bounds checking
* References:
CVE-2008-2662
CVE-2008-2663
CVE-2008-2664
CVE-2008-2725
CVE-2008-2726
LP: #241657
This bug was fixed in the package ruby1.8 - 1.8.6.36-1ubuntu3.2
--------------- 36-1ubuntu3. 2) gutsy-security; urgency=low
ruby1.8 (1.8.6.
* SECURITY UPDATE: denial of service or arbitrary code execution via patches/ 102_CVE- 2008-2662+ 2663+2664+ 2725+2726. dpatch: update
integer overflows and memory corruption
* debian/
array.c to properly validate the size of an array. Update string.c and
sprintf.c for proper bounds checking
* References:
CVE-2008-2662
CVE-2008-2663
CVE-2008-2664
CVE-2008-2725
CVE-2008-2726
LP: #241657
-- Jamie Strandboge <email address hidden> Wed, 25 Jun 2008 15:31:40 -0400