Moderate security update for Ruby featuring fixes for APOP, X.509, BigDecimal issue
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | ruby security update | 2 Jul 200900:00 | – | oraclelinux |
![]() | Moderate: evolution-data-server security update | 26 Jun 200700:00 | – | oraclelinux |
![]() | Moderate: evolution security update | 17 May 200700:00 | – | oraclelinux |
![]() | Moderate: fetchmail security update | 7 Jun 200700:00 | – | oraclelinux |
![]() | Moderate: mutt security update | 4 Jun 200700:00 | – | oraclelinux |
![]() | RHEL 4 / 5 : ruby (RHSA-2009:1140) | 3 Jul 200900:00 | – | nessus |
![]() | Oracle Linux 5 : ruby (ELSA-2009-1140) | 12 Jul 201300:00 | – | nessus |
![]() | Scientific Linux Security Update : ruby on SL4.x, SL5.x i386/x86_64 | 1 Aug 201200:00 | – | nessus |
![]() | CentOS 5 : ruby (CESA-2009:1140) | 6 Jan 201000:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : ruby (MDVSA-2009:325) | 8 Dec 200900:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 4 | s390 | ruby | 1.8.1-7.el4_8.3 | ruby-1.8.1-7.el4_8.3.s390.rpm |
RedHat | 4 | x86_64 | ruby-tcltk | 1.8.1-7.el4_8.3 | ruby-tcltk-1.8.1-7.el4_8.3.x86_64.rpm |
RedHat | 5 | ia64 | ruby-rdoc | 1.8.5-5.el5_3.7 | ruby-rdoc-1.8.5-5.el5_3.7.ia64.rpm |
RedHat | 5 | ppc | ruby-irb | 1.8.5-5.el5_3.7 | ruby-irb-1.8.5-5.el5_3.7.ppc.rpm |
RedHat | 5 | i386 | ruby-devel | 1.8.5-5.el5_3.7 | ruby-devel-1.8.5-5.el5_3.7.i386.rpm |
RedHat | 4 | ia64 | ruby-docs | 1.8.1-7.el4_8.3 | ruby-docs-1.8.1-7.el4_8.3.ia64.rpm |
RedHat | 4 | ppc | ruby-mode | 1.8.1-7.el4_8.3 | ruby-mode-1.8.1-7.el4_8.3.ppc.rpm |
RedHat | 5 | s390x | ruby-devel | 1.8.5-5.el5_3.7 | ruby-devel-1.8.5-5.el5_3.7.s390x.rpm |
RedHat | 5 | ppc64 | ruby-libs | 1.8.5-5.el5_3.7 | ruby-libs-1.8.5-5.el5_3.7.ppc64.rpm |
RedHat | 4 | ia64 | ruby-libs | 1.8.1-7.el4_8.3 | ruby-libs-1.8.1-7.el4_8.3.ia64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo