copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2007.0948 -- [Debian] -- New ruby packages fix insecure SSL certificate validation

Date: 26 November 2007
References: ESB-2007.0910  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                         ESB-2007.0948 -- [Debian]
         New ruby packages fix insecure SSL certificate validation
                             26 November 2007

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              ruby 1.8
                      libopenssl-ruby
                      ruby 1.9
Publisher:            Debian
Operating System:     Debian GNU/Linux 3.1
                      Debian GNU/Linux 4.0
Impact:               Access Confidential Data
Access:               Remote/Unauthenticated
CVE Names:            CVE-2007-5770 CVE-2007-5162

Ref:                  ESB-2007.0910

Original Bulletin:    http://www.debian.org/security/2007/dsa-1410
                      http://www.debian.org/security/2007/dsa-1411
                      http://www.debian.org/security/2007/dsa-1412

Comment: This bulletin contains three (3) Debian Security Advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1410-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
November 24, 2007                     http://www.debian.org/security/faq
- - ------------------------------------------------------------------------

Package        : ruby1.8
Vulnerability  : programming error
Problem type   : local/remote
Debian-specific: no
CVE Id(s)      : CVE-2007-5162 CVE-2007-5770

Several vulnerabilities have been discovered in Ruby, an object-oriented
scripting language. The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2007-5162

    It was discovered that the Ruby HTTP(S) module performs insufficient
    validation of SSL certificates, which may lead to man-in-the-middle
    attacks.

CVE-2007-5770

    It was discovered that the Ruby modules for FTP, Telnet, IMAP, POP
    and SMTP perform insufficient validation of SSL certificates, which
    may lead to man-in-the-middle attacks.

For the stable distribution (etch), these problems have been fixed in
version 1.8.5-4etch1. Packages for sparc will be provided later.

For the old stable distribution (sarge), these problems have been fixed
in version 1.8.2-7sarge6. Packages for sparc will be provided later.

We recommend that you upgrade your ruby1.8 packages.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian 3.1 (oldstable)
- - ----------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6.diff.gz
    Size/MD5 checksum:   538242 39599e76e17e8b5cc1ec766b71593d9f
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6.dsc
    Size/MD5 checksum:     1024 b1798609dcf45a62e1d9afc4fe93bfff
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2.orig.tar.gz
    Size/MD5 checksum:  3623780 4bc5254bec262d18cf1ceef03aae8bdf

Architecture independent packages:

  http://security.debian.org/pool/updates/main/r/ruby1.8/ri1.8_1.8.2-7sarge6_all.deb
    Size/MD5 checksum:   714364 09696ca7acac5bab3e3d06a9ae660e62
  http://security.debian.org/pool/updates/main/r/ruby1.8/irb1.8_1.8.2-7sarge6_all.deb
    Size/MD5 checksum:   166946 32d06bc68ea2265bea556dc2226ed04d
  http://security.debian.org/pool/updates/main/r/ruby1.8/rdoc1.8_1.8.2-7sarge6_all.deb
    Size/MD5 checksum:   234778 8de6b4af2fefe62a68ee879ebe7ff883
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-elisp_1.8.2-7sarge6_all.deb
    Size/MD5 checksum:   143970 1a910ea5668693d3a6d2c557f18385a5
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-examples_1.8.2-7sarge6_all.deb
    Size/MD5 checksum:   219566 d5e35a1d40a6a072b56a49e5a187bd84

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_alpha.deb
    Size/MD5 checksum:   134122 692423c760d0c010d62303c683ae5b9c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_alpha.deb
    Size/MD5 checksum:   239626 72825b5c797687a684d565b878fc687e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_alpha.deb
    Size/MD5 checksum:   138232 4fb20d59981cae34ab7904013f262f18
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_alpha.deb
    Size/MD5 checksum:   827678 93e80a7a28254547b9c8d206e15e8a24
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_alpha.deb
    Size/MD5 checksum:   796352 b6f60a2f2cdec72d3ccd79e7786ca894
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_alpha.deb
    Size/MD5 checksum:   153134 dbcd57f97f2317a4f0634e930e138fa3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_alpha.deb
    Size/MD5 checksum:  1477690 e2795b5de4dbc4530d1047bcace240c1
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_alpha.deb
    Size/MD5 checksum:   136664 e0ac034c3873b75e375b99322659501b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_alpha.deb
    Size/MD5 checksum:  1480146 79b24141759b2b95d2f1ec65c548b620

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_amd64.deb
    Size/MD5 checksum:  1447486 800abb11f9c785186e65070ef2828d26
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_amd64.deb
    Size/MD5 checksum:  1393124 bb473bf5d25f7547e320132c9df9e359
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_amd64.deb
    Size/MD5 checksum:   152322 7df90f3e6035ca5a6faf4cd7d2b69645
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_amd64.deb
    Size/MD5 checksum:   649882 6841742c85ec07f2e80a7d6a0901b3e3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_amd64.deb
    Size/MD5 checksum:   136038 9631afc8383ad8b24568a3a7cc13fe4f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_amd64.deb
    Size/MD5 checksum:   137510 bda0b8be47b912e1b3ea91701791a17f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_amd64.deb
    Size/MD5 checksum:   781520 652266305893bb4f2961cbdb56d6e277
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_amd64.deb
    Size/MD5 checksum:   234924 2c4b2b0cfd5aa0389fab980af9b0b359
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_amd64.deb
    Size/MD5 checksum:   133344 19c93134937f9346b697928f14e6d078

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_arm.deb
    Size/MD5 checksum:   222118 0ae4f35121cd25b6cd48d1997aaa229c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_arm.deb
    Size/MD5 checksum:  1357218 f274edf0ab17e2cb6241c7e5ae7dc692
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_arm.deb
    Size/MD5 checksum:   135820 e5d3ab59650f70f5a9d84cd751714276
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_arm.deb
    Size/MD5 checksum:   659972 f65c477a96f63b90d02e385c2bb96dcc
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_arm.deb
    Size/MD5 checksum:   153778 f8dcec38e3c40ccab16652750e31a450
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_arm.deb
    Size/MD5 checksum:   134804 eb916ede03bc9805a8a2a39ae1028186
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_arm.deb
    Size/MD5 checksum:   132578 4da02ddac3fb39c9aed9a7869d44e2be
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_arm.deb
    Size/MD5 checksum:   744402 4e5688bc651586013dbf879cbc6bb888
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_arm.deb
    Size/MD5 checksum:  1471850 9635426af4164ea3a5f4d639a24d60c2

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_hppa.deb
    Size/MD5 checksum:   138888 deaaa4fdf27da5f7811d7608d6044ccb
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_hppa.deb
    Size/MD5 checksum:   137222 4ee07ffe9f4754872ed781856e51f682
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_hppa.deb
    Size/MD5 checksum:   134398 1be629392df8d287e63fed7dcdb33f18
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_hppa.deb
    Size/MD5 checksum:   736694 1110673c4e635e8da1a3814435c0a429
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_hppa.deb
    Size/MD5 checksum:   840642 76267d11e9a569770089d4982b6c1646
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_hppa.deb
    Size/MD5 checksum:  1501662 82cfb73be69fef782dc96e969ee43d58
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_hppa.deb
    Size/MD5 checksum:   152698 82792044f058a1d000a2c6bdf024d14e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_hppa.deb
    Size/MD5 checksum:  1454252 bed3faab78ebbf680439a9bceece0ed1
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_hppa.deb
    Size/MD5 checksum:   247678 4428f6529ca895e5a8e189fd17f80514

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_i386.deb
    Size/MD5 checksum:   226602 6552d89766fb8913f9320d8db5a48ace
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_i386.deb
    Size/MD5 checksum:   135648 e86ee40c16f3f41c07310344aecd9d08
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_i386.deb
    Size/MD5 checksum:   153918 150bbfc48a1958fcb834877c2772a2b6
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_i386.deb
    Size/MD5 checksum:   759000 9d6318b60d2159b5867702b44f3948a3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_i386.deb
    Size/MD5 checksum:   136910 e5480ebf6dba001272960c84a531a120
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_i386.deb
    Size/MD5 checksum:   622330 57826c627bc8f4011d6c8021167d284a
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_i386.deb
    Size/MD5 checksum:  1354678 bc4cbd154daad459d8bfced5ca9904e8
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_i386.deb
    Size/MD5 checksum:   132686 11754b54a535ee73a158e144b3aff327
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_i386.deb
    Size/MD5 checksum:  1466328 2342a5e9740beda4b73d7cdfa2dbd041

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_ia64.deb
    Size/MD5 checksum:  1463602 7804799643634b0d656b1518651a6b9c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_ia64.deb
    Size/MD5 checksum:   136466 80fef2f04d22dbb11025a3363ca34eef
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_ia64.deb
    Size/MD5 checksum:   139278 07ef736384975ad852a2824adbd9945f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_ia64.deb
    Size/MD5 checksum:   141092 e096292a2cbcce5eac583a45291a7ca5
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_ia64.deb
    Size/MD5 checksum:  1704716 1eaf6046317edd97746a79851dcc5ea2
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_ia64.deb
    Size/MD5 checksum:   999354 726c8da9cc612b1f02f6b6f5f45427f2
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_ia64.deb
    Size/MD5 checksum:   868230 27303b885bcc8ace2bb4e4cb2c0833ba
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_ia64.deb
    Size/MD5 checksum:   266542 7820f18297bfd48ad817a8002d6dc3d1
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_ia64.deb
    Size/MD5 checksum:   153068 4d3791a672a9a694d5dfd9a4e17388cd

m68k architecture (Motorola Mc680x0)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_m68k.deb
    Size/MD5 checksum:   136500 188554268dbc87310b064d1aed6f1cbb
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_m68k.deb
    Size/MD5 checksum:   231664 4f0182ecabcfaa4f72b6a721a9b020b2
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_m68k.deb
    Size/MD5 checksum:  1440244 02acfc32c3d5efd21d15e86ba7a99cfe
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_m68k.deb
    Size/MD5 checksum:   132774 1210502ccc19a8af0e9dc0acf218fb25
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_m68k.deb
    Size/MD5 checksum:   730834 0293bc436b79636cf710c5166d57b609
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_m68k.deb
    Size/MD5 checksum:  1333566 624b5a9bca83fed6f523efddf0a83f75
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_m68k.deb
    Size/MD5 checksum:   553846 f4e4a9200b34e952d220f81b2f9ac63d
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_m68k.deb
    Size/MD5 checksum:   152090 7a62521dddf10b751358322354c41c34
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_m68k.deb
    Size/MD5 checksum:   135104 bdcf06277b4622e3307b7bb27d9465c3

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_mips.deb
    Size/MD5 checksum:   136248 c60975752522a516c805b4ba812306ca
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_mips.deb
    Size/MD5 checksum:  1356736 4c2143618806076b9d3b1502033eed7d
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_mips.deb
    Size/MD5 checksum:   216318 f696691516aa4c8fe7cb3effe1d39897
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_mips.deb
    Size/MD5 checksum:   134870 bcd2fa2d9ad6d7b15fb3927b7564d423
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_mips.deb
    Size/MD5 checksum:   684974 fd2ebdb6ac3031e7b415c49be607d115
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_mips.deb
    Size/MD5 checksum:  1436630 5b932a9695912aa04ff9b0a57e0b26bf
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_mips.deb
    Size/MD5 checksum:   132332 26c1e34a68034210fdca7afbb1c1d5a3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_mips.deb
    Size/MD5 checksum:   764538 dd1de0c06afd4e99db8ab956158cd518
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_mips.deb
    Size/MD5 checksum:   152912 6c4d5781d86ca8a813da599059c9c352

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_mipsel.deb
    Size/MD5 checksum:   132294 4431479504fd229b8dedda2da2923f87
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_mipsel.deb
    Size/MD5 checksum:  1436884 239c1d12ac81095096171240fa2ffda8
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_mipsel.deb
    Size/MD5 checksum:  1358162 d7098f9de81e281db59d8ddf55359744
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_mipsel.deb
    Size/MD5 checksum:   215528 931a2fa30b10892f164ce7d14164f901
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_mipsel.deb
    Size/MD5 checksum:   152910 c894347aed939851e36b69ef988bd081
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_mipsel.deb
    Size/MD5 checksum:   678706 e2536180fd5d762e0b654028e7e14bd3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_mipsel.deb
    Size/MD5 checksum:   757406 d7c471312a439a0f76520bc503b3ff8c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_mipsel.deb
    Size/MD5 checksum:   136280 1d2157418509c170f8ee3e9199f62884
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_mipsel.deb
    Size/MD5 checksum:   134906 cfc505a21d9ec2d8ead5daca44e24cf3

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_powerpc.deb
    Size/MD5 checksum:   621932 147c7638e30642d2eef1f7d35fc37200
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_powerpc.deb
    Size/MD5 checksum:   138608 5b58a1960fa062a4a76e0d42d49d39ab
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_powerpc.deb
    Size/MD5 checksum:  1445108 bcb6ac0a55af11abc8a0bc1f32e74650
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_powerpc.deb
    Size/MD5 checksum:   134504 3f48e739ffef99a23593e79681e397da
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_powerpc.deb
    Size/MD5 checksum:  1406938 f4696d8f0a7a972fcdd9dddf29bb907b
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_powerpc.deb
    Size/MD5 checksum:   154150 41e9531d493168a6d7dff756ec2b0ac7
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_powerpc.deb
    Size/MD5 checksum:   137468 d55c45bd6a5f9baa763712f927c307b9
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_powerpc.deb
    Size/MD5 checksum:   970994 68b27d81c20df29c56905f6b0a5480c1
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_powerpc.deb
    Size/MD5 checksum:   225896 c550c5be957525c4caf7552b5ed27685

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge6_s390.deb
    Size/MD5 checksum:   133836 a132cd683ea7f1d128d86d64f4ebbe6c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge6_s390.deb
    Size/MD5 checksum:  1447946 7ab57fc842cfada996f566921c639ece
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge6_s390.deb
    Size/MD5 checksum:   137866 f3bb17f94c3730b04b05d362f49599dd
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge6_s390.deb
    Size/MD5 checksum:   907892 acc815e40971d7279721b7d97a3439ca
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge6_s390.deb
    Size/MD5 checksum:  1431506 bc525ce8b50030ff33fb7526b96854dc
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge6_s390.deb
    Size/MD5 checksum:   675540 f9ff536827df915a175b1e2b5f830c80
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge6_s390.deb
    Size/MD5 checksum:   240628 dea8371b34a888dda16914da497b867c
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge6_s390.deb
    Size/MD5 checksum:   152388 e66c473929cbb2285f07a84fcf461296
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge6_s390.deb
    Size/MD5 checksum:   136514 5c85cec29dfece284b7032ffe0ef9fa8

Debian 4.0 (stable)
- - -------------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5.orig.tar.gz
    Size/MD5 checksum:  4434227 aae9676332fcdd52f66c3d99b289878f
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1.diff.gz
    Size/MD5 checksum:    96987 ba883f546704659fcaaa6f8aa247f0b0
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1.dsc
    Size/MD5 checksum:     1078 fd83f6df787ffaf1262f95072b40a62a

Architecture independent packages:

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-examples_1.8.5-4etch1_all.deb
    Size/MD5 checksum:   244560 3f66cc3227b999b95a35131e21cf2ac2
  http://security.debian.org/pool/updates/main/r/ruby1.8/irb1.8_1.8.5-4etch1_all.deb
    Size/MD5 checksum:   235140 11ddd1e4eda7b4bc58e6e386640bcc47
  http://security.debian.org/pool/updates/main/r/ruby1.8/ri1.8_1.8.5-4etch1_all.deb
    Size/MD5 checksum:  1244786 1a69b407508dc883ebb6d402b865c336
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-elisp_1.8.5-4etch1_all.deb
    Size/MD5 checksum:   210566 00a62f3fe0793636f03b9fa688f7bfc3
  http://security.debian.org/pool/updates/main/r/ruby1.8/rdoc1.8_1.8.5-4etch1_all.deb
    Size/MD5 checksum:   309798 e6dbda6e8445378b39672d458e8d59ef

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch1_alpha.deb
    Size/MD5 checksum:   903320 942ebaa4c6e5b0f59c772bb97804ae90
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch1_alpha.deb
    Size/MD5 checksum:  1863408 89277ed5c3653c9bdc18ae2b4f732833
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch1_alpha.deb
    Size/MD5 checksum:   198730 e4eae8fe37add49a376a3445ac28b52e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch1_alpha.deb
    Size/MD5 checksum:  1078712 2a69b9c82c8bd2d999a52d30163013c4
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1_alpha.deb
    Size/MD5 checksum:   217894 20937bf57da54c3425b0544066557d5e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch1_alpha.deb
    Size/MD5 checksum:  1638804 014c7816f19fa38213adc755119bb5dc
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch1_alpha.deb
    Size/MD5 checksum:   198564 24ae5e516ef458f86071c5b69a9e7c55
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch1_alpha.deb
    Size/MD5 checksum:   301290 5efebef4b0e71b019a2d1e0b5d7ef759
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch1_alpha.deb
    Size/MD5 checksum:   197782 4a4b638f1fa1776ee85402712946346d

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch1_amd64.deb
    Size/MD5 checksum:   748104 1aff412924d73f6fbda81fdf50414c9f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch1_amd64.deb
    Size/MD5 checksum:   302446 29547e81252dc43b160b0550ef9b3275
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch1_amd64.deb
    Size/MD5 checksum:  1584288 2b14a8dee7dd6d9162fc1a687104c5c6
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch1_amd64.deb
    Size/MD5 checksum:   198254 8b39879a296a2769951708e8d26ed9f8
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1_amd64.deb
    Size/MD5 checksum:   216842 21df347b83dc06077150457a771422c1
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch1_amd64.deb
    Size/MD5 checksum:   197642 c08b288c112eca5d5024ae4f1c597507
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch1_amd64.deb
    Size/MD5 checksum:  1067294 e2ba5cb9824946d461d649b999e5f55e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch1_amd64.deb
    Size/MD5 checksum:   197206 9e082fb7fc66f34c38b1428c65a7565a
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch1_amd64.deb
    Size/MD5 checksum:  1863830 7d00dbbaf9b0c212a60e2bc43c40ee75

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch1_arm.deb
    Size/MD5 checksum:   196178 037a0c1c583240b243090b7ccd05081c
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1_arm.deb
    Size/MD5 checksum:   218846 1d5fd3a9d297ff842e1dbb0acbeeae8e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch1_arm.deb
    Size/MD5 checksum:   287046 929c3fd05e77f675951adb874b54e770
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch1_arm.deb
    Size/MD5 checksum:   696690 b8f7d660c22ed075e812f290502ec23e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch1_arm.deb
    Size/MD5 checksum:   197278 a871ee7ca58f9358d7f2402db5e3182a
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch1_arm.deb
    Size/MD5 checksum:  1524596 502ad74613e41bda3d00d0855b9c027a
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch1_arm.deb
    Size/MD5 checksum:   992616 a8647531a6553b0189a36e2cbe456ef5
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch1_arm.deb
    Size/MD5 checksum:  1858506 1315401db0e72d1d9cfa115141641499
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch1_arm.deb
    Size/MD5 checksum:   196884 dc5f80bd229814e3ef5cd65d5ce11b36

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch1_hppa.deb
    Size/MD5 checksum:   315386 4ab6734382626fa6e264bc51dc2369f4
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch1_hppa.deb
    Size/MD5 checksum:  1043092 bdfbdd69b9c3b2538b2ef77343d2afac
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1_hppa.deb
    Size/MD5 checksum:   217894 9b1036e79de1d54d838e980ddebfd36f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch1_hppa.deb
    Size/MD5 checksum:   198788 d3d4836f8b353d5860099573887b789f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch1_hppa.deb
    Size/MD5 checksum:   199806 3a2f04a684b4efbefa55ae62d3711231
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch1_hppa.deb
    Size/MD5 checksum:  1668446 c8553ba23003ccc79c29b37c15b95685
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch1_hppa.deb
    Size/MD5 checksum:  1843186 190b06b50ad6431cfdfcd81504cdcfc6
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch1_hppa.deb
    Size/MD5 checksum:   199272 23a8dad53c1904f5530c1c62cf89f36f
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch1_hppa.deb
    Size/MD5 checksum:   824172 daa58b050059e8b856d30e0ffbe4f44e

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch1_i386.deb
    Size/MD5 checksum:   719040 6a9bac4aa232529f504c90c4a80c79ec
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch1_i386.deb
    Size/MD5 checksum:  1856154 0de4f563e8c3ec1e7bb0f54854782fc1
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch1_i386.deb
    Size/MD5 checksum:   197464 0e931602da1ae17f3d339ab591827f4e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch1_i386.deb
    Size/MD5 checksum:   197810 909defd6d71335937700c058aeba54c3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch1_i386.deb
    Size/MD5 checksum:  1532112 f3ab5f20931a3a019fae103c4c066b12
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1_i386.deb
    Size/MD5 checksum:   218948 b2690af1cf6762a733aab90dcff6aa46
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch1_i386.deb
    Size/MD5 checksum:   293252 77dd046c1b7d34ac30fd5e1acf4ede7a
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch1_i386.deb
    Size/MD5 checksum:   998788 3947ba865681c395c1914b980987cc3e
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch1_i386.deb
    Size/MD5 checksum:   197102 8f348428e7e6083ce5e227c5e1a5f6b9

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch1_ia64.deb
    Size/MD5 checksum:   330094 bf475625987ba06c8b89da32c55d5056
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch1_ia64.deb
    Size/MD5 checksum:   200998 2b9bf2707faeb0428840e80b51385f3b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch1_ia64.deb
    Size/MD5 checksum:   201968 0ea052d16bf1f1a87657887488f34761
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1_ia64.deb
    Size/MD5 checksum:   218130 2ac65355352892a0d338e52e17234e9f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch1_ia64.deb
    Size/MD5 checksum:   202920 3e3e2f550576f0092ed139c70b4f1da5
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch1_ia64.deb
    Size/MD5 checksum:   971008 99eb2cb48c5cd15dcc1e8c619f0cd594
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch1_ia64.deb
    Size/MD5 checksum:  1893660 a9a37b334b7df00a1b6400482ab2d931
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch1_ia64.deb
    Size/MD5 checksum:  1861350 41a85b70e4901e856da7cba5c0851b90
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch1_ia64.deb
    Size/MD5 checksum:  1025788 012bea900aa0d152e6ec8efe60c54570

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1_mips.deb
    Size/MD5 checksum:   217660 fb3c7c2678719c0aa85b66621acee9e1
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch1_mips.deb
    Size/MD5 checksum:   803872 7dce12b2144c83267cab44fe7acd9a5d
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch1_mips.deb
    Size/MD5 checksum:   279286 c59cb366475c182c6c4d60ad2f97d11a
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch1_mips.deb
    Size/MD5 checksum:   197240 b485eb831b34daf7cd9f218715b937e3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch1_mips.deb
    Size/MD5 checksum:   196598 9d4c555dea6e95172e3efe3b92a1c1e6
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch1_mips.deb
    Size/MD5 checksum:  1537008 432e83243fc2f6b3a7bdef2a30acbf90
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch1_mips.deb
    Size/MD5 checksum:   197516 bde78f7d314c97ba507c8a805cd663b3
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch1_mips.deb
    Size/MD5 checksum:  1829596 ebaba4924f296dee66c01ea89116c7d9
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch1_mips.deb
    Size/MD5 checksum:  1085526 9308a435e598f32787167e10f68839e7

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1_mipsel.deb
    Size/MD5 checksum:   217660 5193709b9ee2fcb4ee84c9ff4d3a9d84
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch1_mipsel.deb
    Size/MD5 checksum:  1536436 68e7de8ef9b6009cc9c9a8fa5c77447b
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch1_mipsel.deb
    Size/MD5 checksum:   792814 d125b574cd2df5aa1f4197030e0a449c
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch1_mipsel.deb
    Size/MD5 checksum:   197226 472690761339a0ae19b8a16cf7c3b9d8
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch1_mipsel.deb
    Size/MD5 checksum:   278772 e98331330d656b126c0dd691d5c9957f
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch1_mipsel.deb
    Size/MD5 checksum:  1059896 491688752a362063d03b6154306bb1c6
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch1_mipsel.deb
    Size/MD5 checksum:  1829834 58ef315adccdbc177f393c77a774224b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch1_mipsel.deb
    Size/MD5 checksum:   197582 dcd4644d319ffeba90435b61ec8669ca
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch1_mipsel.deb
    Size/MD5 checksum:   196642 d4113debf5726b270a031a7561b55a4f

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch1_powerpc.deb
    Size/MD5 checksum:   199260 f0381b0bad8ef9e64fe3a2923cb1d950
  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch1_powerpc.deb
    Size/MD5 checksum:  1836850 684abfad3c113e57353e3401c40a8aa8
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch1_powerpc.deb
    Size/MD5 checksum:   718352 7b0f71d9de32d844d61f14a4a679b4cb
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1_powerpc.deb
    Size/MD5 checksum:   218930 34d30cfc5e4e36cd7e90e9f322923378
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch1_powerpc.deb
    Size/MD5 checksum:   199028 abba637fda3c05b1a889703825a37364
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch1_powerpc.deb
    Size/MD5 checksum:   293534 7d6c5e6275adcaa7aa813c199f710fe4
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch1_powerpc.deb
    Size/MD5 checksum:   199560 0e4c06bae8e8a3021c2592b33c41d8c8
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch1_powerpc.deb
    Size/MD5 checksum:  1590138 44534150de85e3f716f845c8b48a825b
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch1_powerpc.deb
    Size/MD5 checksum:  1108430 97af1b9c0e89dd1479bfc221baed8eb0

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.5-4etch1_s390.deb
    Size/MD5 checksum:  1838528 2056acb7613f6d48277db15e04b076b7
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.5-4etch1_s390.deb
    Size/MD5 checksum:   778756 c553471b59131a58479463cebf90ce95
  http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.5-4etch1_s390.deb
    Size/MD5 checksum:   198488 88ff607847cf2fcb6e4411db10a068df
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.5-4etch1_s390.deb
    Size/MD5 checksum:  1051574 cc4f934e65b209bb5985902fa0aac21e
  http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.5-4etch1_s390.deb
    Size/MD5 checksum:   217532 39de73e19edb31ee2c4debbb46c67891
  http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.5-4etch1_s390.deb
    Size/MD5 checksum:   198974 575aef2b1651f2234f2c925f1e3e369d
  http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.5-4etch1_s390.deb
    Size/MD5 checksum:  1617414 20ab657bb34b561ffe628ba6edad0181
  http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.5-4etch1_s390.deb
    Size/MD5 checksum:   198174 fc20f67c4495db2765d28d73f412d05a
  http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.5-4etch1_s390.deb
    Size/MD5 checksum:   304810 7088613dc90ff2f51e7092f2987be087


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHSAuPXm3vHE4uyloRAlf4AJwMLBcRl8dorY/YcK/q5OoyKZCbXQCeJDLn
36a90mEOKja71MiXokErMwI=
=GGwp
- -----END PGP SIGNATURE-----


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1411-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
November 24, 2007                     http://www.debian.org/security/faq
- - ------------------------------------------------------------------------

Package        : libopenssl-ruby
Vulnerability  : programming error
Problem type   : local/remote
Debian-specific: no
CVE Id(s)      : CVE-2007-5162 CVE-2007-5770

Several vulnerabilities have been discovered in Ruby, an object-oriented
scripting language. The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2007-5162

    It was discovered that the Ruby HTTP(S) module performs insufficient
    validation of SSL certificates, which may lead to man-in-the-middle
    attacks.

CVE-2007-5770

    It was discovered that the Ruby modules for FTP, Telnet, IMAP, POP
    and SMTP perform insufficient validation of SSL certificates, which
    may lead to man-in-the-middle attacks.

The stable distribution (etch) no longer contains libopenssl-ruby.

For the old stable distribution (sarge), these problems have been fixed
in version 0.1.4a-1sarge1. Packages for sparc will be provided later.

We recommend that you upgrade your libopenssl-ruby packages.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian 3.1 (oldstable)
- - ----------------------

Oldstable updates are available for alpha, amd64, arm, hppa, i386, ia64, m68k, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby_0.1.4a-1sarge1.diff.gz
    Size/MD5 checksum:     4416 25ee3170c96536d66cd8640474bebf85
  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby_0.1.4a.orig.tar.gz
    Size/MD5 checksum:    84122 303d0473fdb1480a0936a5661d8ba8e3
  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby_0.1.4a-1sarge1.dsc
    Size/MD5 checksum:      654 b1f510c66bbb4af526741c8d5911ffba

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_alpha.deb
    Size/MD5 checksum:    99566 17d715cd50ba41f6c139844de72b50a0

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_amd64.deb
    Size/MD5 checksum:    97832 3a57407b743683544483941f8739f276

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_arm.deb
    Size/MD5 checksum:    90504 80218918d52c9063de2679a0ef308350

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_hppa.deb
    Size/MD5 checksum:   102480 5b217e95e5acd0b41ef69f0fa373ed73

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_i386.deb
    Size/MD5 checksum:    93628 6dd15a1fb32a3792811a7955083d835e

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_ia64.deb
    Size/MD5 checksum:   112496 8dd845a285ba4c46aa148d5e03e142cd

m68k architecture (Motorola Mc680x0)

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_m68k.deb
    Size/MD5 checksum:    94740 25df2cf97eb03a8f1a53c447cfdc7e73

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_mips.deb
    Size/MD5 checksum:    83622 0637caea582cefd6994e9c1bfd105464

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_mipsel.deb
    Size/MD5 checksum:    82978 a717ab31fb14a34d75c7209ba3ad0bda

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_powerpc.deb
    Size/MD5 checksum:    91528 317a63aba89b5255f4bb8f2a3031d563

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/libo/libopenssl-ruby/libopenssl-ruby1.6_0.1.4a-1sarge1_s390.deb
    Size/MD5 checksum:    99954 578551946138e9b1cf38ff65dea29b53


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHSA5XXm3vHE4uyloRAodSAKDZpGyz7MOQgIJDQ6xCRgSfub/CbwCcCN6G
w6EeEIDuMMlhuaQFtNFrI9Q=
=wKz0
- -----END PGP SIGNATURE-----


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-1412-1                  security@debian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
November 24, 2007                     http://www.debian.org/security/faq
- - ------------------------------------------------------------------------

Package        : ruby1.9
Vulnerability  : programming error
Problem type   : local/remote
Debian-specific: no
CVE Id(s)      : CVE-2007-5162 CVE-2007-5770

Several vulnerabilities have been discovered in Ruby, an object-oriented
scripting language. The Common Vulnerabilities and Exposures project
identifies the following problems:

CVE-2007-5162

    It was discovered that the Ruby HTTP(S) module performs insufficient
    validation of SSL certificates, which may lead to man-in-the-middle
    attacks.

CVE-2007-5770

    It was discovered that the Ruby modules for FTP, Telnet, IMAP, POP
    and SMTP perform insufficient validation of SSL certificates, which
    may lead to man-in-the-middle attacks.

For the stable distribution (etch), these problems have been fixed in
version 1.9.0+20060609-1etch1. Updated packages for hppa and sparc will
be provided later.

The old stable distribution (sarge) doesn't contain ruby1.9 packages.

We recommend that you upgrade your ruby1.9 packages.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian (stable)
- - ---------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609.orig.tar.gz
    Size/MD5 checksum:  4450198 483d9b46a973c7e14f7586f0b1129891
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1.dsc
    Size/MD5 checksum:     1102 ab126186fcdf6957657ecc7a796d2716
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1.diff.gz
    Size/MD5 checksum:    24635 627c1adebe5c30393f61c78bd7ed8524

Architecture independent packages:

  http://security.debian.org/pool/updates/main/r/ruby1.9/rdoc1.9_1.9.0+20060609-1etch1_all.deb
    Size/MD5 checksum:   317966 ba31da840a0129e36f8e5e3cdbdc38f2
  http://security.debian.org/pool/updates/main/r/ruby1.9/ri1.9_1.9.0+20060609-1etch1_all.deb
    Size/MD5 checksum:   693558 9609c753abeb56de1340a6861df37882
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-elisp_1.9.0+20060609-1etch1_all.deb
    Size/MD5 checksum:   228790 c7680de3c4f480e47b50362dfbbc6cc2
  http://security.debian.org/pool/updates/main/r/ruby1.9/irb1.9_1.9.0+20060609-1etch1_all.deb
    Size/MD5 checksum:   255110 8ab705f6d663c5f9514bd658ab7e6cf6
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-examples_1.9.0+20060609-1etch1_all.deb
    Size/MD5 checksum:   265132 9cf18d3bc7adea316ac681e63b1f941a

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch1_alpha.deb
    Size/MD5 checksum:   324370 e17822d9a9e40bda497f300118bef0cc
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1_alpha.deb
    Size/MD5 checksum:   235830 fbdee75ddf6467da59dd7fba95661d38
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch1_alpha.deb
    Size/MD5 checksum:   958976 5d5c6f6b5d9ff8ee73d7b4c3e76d9933
  http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch1_alpha.deb
    Size/MD5 checksum:   216232 5103972d418efcf11b74d85e742e275f
  http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch1_alpha.deb
    Size/MD5 checksum:   216884 e9dedb7b4604176f79cd4e58b4a17755
  http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch1_alpha.deb
    Size/MD5 checksum:  1879324 5f1e231d02c18d628783ea7ae9a12cb8
  http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch1_alpha.deb
    Size/MD5 checksum:   216888 18be35a4de25e208bccdab734ec741da
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch1_alpha.deb
    Size/MD5 checksum:  1890058 202b057c31c1f290ea93d297f470ba03
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch1_alpha.deb
    Size/MD5 checksum:   341360 507106ae5d966124e720eeade516ccf1

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch1_amd64.deb
    Size/MD5 checksum:  1877670 6b504064d3b9da06c8d1fe8be0b0bf3a
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch1_amd64.deb
    Size/MD5 checksum:  1848808 dbb9ee9eeeb2c5613f70a8e3d2637617
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1_amd64.deb
    Size/MD5 checksum:   234876 156535028b15b94577dc4e4633e5ebff
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch1_amd64.deb
    Size/MD5 checksum:   806586 773c43721a32c24e44e8c8094f91650f
  http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch1_amd64.deb
    Size/MD5 checksum:   215426 6ebf982794e096d2c5bebf24f92f9ec6
  http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch1_amd64.deb
    Size/MD5 checksum:   322810 91e135d2d5f379ed0faf858c646e2148
  http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch1_amd64.deb
    Size/MD5 checksum:   215916 c3f89134875c80ff6b7c3b88bbc56bef
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch1_amd64.deb
    Size/MD5 checksum:   345242 e7664eae307b6959ad357c0b5ef421fc
  http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch1_amd64.deb
    Size/MD5 checksum:   215976 7a1a5115707c78c760a4c6503fdd3f98

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch1_arm.deb
    Size/MD5 checksum:  1791476 300dc9be30ca522c432b00ee915c6026
  http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch1_arm.deb
    Size/MD5 checksum:   214922 536a4d80d79ddf8bdd8c49319ee19cd1
  http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch1_arm.deb
    Size/MD5 checksum:   215586 75f2e47fe038c2a7d0e004a802e9f4a6
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1_arm.deb
    Size/MD5 checksum:   236560 99c45bcd8332240fd79f2c6065d0dd4e
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch1_arm.deb
    Size/MD5 checksum:   364396 b9effa7cd406b65cd4316becddafff37
  http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch1_arm.deb
    Size/MD5 checksum:   310900 a93b0e66cbd77a78f8f18f48ebef6e13
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch1_arm.deb
    Size/MD5 checksum:   792192 532c1d78b722ebdf42019a5979ddc054
  http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch1_arm.deb
    Size/MD5 checksum:  1875584 7c71b01f46cacd514ca4f08c5b5d8941
  http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch1_arm.deb
    Size/MD5 checksum:   215652 e10b801d1d05b5aff98731b03045d351

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1_i386.deb
    Size/MD5 checksum:   236898 446710e9933b7170337a333049eaee5f
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch1_i386.deb
    Size/MD5 checksum:  1751226 4444b1884c784b71902ad2a61ba3f567
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch1_i386.deb
    Size/MD5 checksum:   757158 711d62d5e869c1f9006559326798a52b
  http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch1_i386.deb
    Size/MD5 checksum:   214942 38982b66583c25c7522103a3a9eb54bc
  http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch1_i386.deb
    Size/MD5 checksum:   215982 79d148e2fc2175a2a70c661b08139000
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch1_i386.deb
    Size/MD5 checksum:   345026 bbe0ac1615f698cf82099baceb00a7c6
  http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch1_i386.deb
    Size/MD5 checksum:  1867168 25ed04efb273ff4897d7b05247417ada
  http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch1_i386.deb
    Size/MD5 checksum:   215746 00a851c1c75103533176fc7fd998da20
  http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch1_i386.deb
    Size/MD5 checksum:   308928 3358300bb639a29c2e8b21ced7cdc7a1

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch1_ia64.deb
    Size/MD5 checksum:   351012 fff4cf6d236b0108031334afdd65d658
  http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch1_ia64.deb
    Size/MD5 checksum:   220024 b9085af8454b394bfac281c9b79bd515
  http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch1_ia64.deb
    Size/MD5 checksum:   219546 83eb67d7a5163abb2f5ea650a188dd75
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1_ia64.deb
    Size/MD5 checksum:   235712 8ae5a0e86166574544af29c25eebbae7
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch1_ia64.deb
    Size/MD5 checksum:  1094592 0822d1188d9fc3d6cb960ca10a741687
  http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch1_ia64.deb
    Size/MD5 checksum:  1862882 b54dd65c54f2b5345a7b6dbd5393c06c
  http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch1_ia64.deb
    Size/MD5 checksum:   220020 91e0487d7d3b8739d9fc537797be1936
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch1_ia64.deb
    Size/MD5 checksum:  2224142 7311bd4900754e9c1dbd8b22b39e7899
  http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch1_ia64.deb
    Size/MD5 checksum:   350428 7337d9dc53bee9e59787d8e752ed149b

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch1_mips.deb
    Size/MD5 checksum:   215780 c9abc5b3f35adb569bb8ad8ba447b021
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1_mips.deb
    Size/MD5 checksum:   234938 6f396aaaed493d095ad2d7b9eb206594
  http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch1_mips.deb
    Size/MD5 checksum:   215554 9e42ee927f755d845938188b7368661f
  http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch1_mips.deb
    Size/MD5 checksum:   214906 5da2a002ded39e8ce78bcf9062fb9fcb
  http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch1_mips.deb
    Size/MD5 checksum:   300588 16420c8046f02807aba930c5fde83ebd
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch1_mips.deb
    Size/MD5 checksum:   371722 217781278232fccf78863910d43b6590
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch1_mips.deb
    Size/MD5 checksum:  1677222 69e58910f6d5e63c941b98b3d2855d43
  http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch1_mips.deb
    Size/MD5 checksum:  1836498 cd3c713268cf294228fa733a942152af
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch1_mips.deb
    Size/MD5 checksum:   871412 8190ec0ff4b79d1d0a92f09500043e44

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch1_mipsel.deb
    Size/MD5 checksum:  1836126 ec3b66a7b3195ade4ed5d6d57d73cf28
  http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch1_mipsel.deb
    Size/MD5 checksum:   215454 14d24e9a40eddef48859eb62046a3eb6
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1_mipsel.deb
    Size/MD5 checksum:   234944 303fe8a90a774955f064283a02f1e423
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch1_mipsel.deb
    Size/MD5 checksum:   857548 d569e105874998930cff4f5f7939229e
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch1_mipsel.deb
    Size/MD5 checksum:   366862 d480d18423806370c3b592719d3bab0c
  http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch1_mipsel.deb
    Size/MD5 checksum:   215668 79862a039354f6d83ee43f9cfdc7d2e6
  http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch1_mipsel.deb
    Size/MD5 checksum:   298912 dff65dea9cecbb757adf7f1773206ced
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch1_mipsel.deb
    Size/MD5 checksum:  1666810 5d341dda049770f918991569bff711c4
  http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch1_mipsel.deb
    Size/MD5 checksum:   214776 8ba9bb28cdb11ee703d2224eb0a37b6d

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1_powerpc.deb
    Size/MD5 checksum:   236652 79b759321a1138c27ffbf0c774ef9819
  http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch1_powerpc.deb
    Size/MD5 checksum:   217902 50b4417179daab09a66b260be6018e90
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch1_powerpc.deb
    Size/MD5 checksum:   776090 943815a68257420ea136c304eed752da
  http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch1_powerpc.deb
    Size/MD5 checksum:   217580 41bf17420cfc61124d4213a94d684bed
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch1_powerpc.deb
    Size/MD5 checksum:  1806780 fb9d4b73688f7eafc93ad7d90df625d8
  http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch1_powerpc.deb
    Size/MD5 checksum:  1843594 22b896c414bd19519b2efb2c3bad6c65
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch1_powerpc.deb
    Size/MD5 checksum:   372310 ff19b747cd3b9447a84148e71d2d0b38
  http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch1_powerpc.deb
    Size/MD5 checksum:   217016 b685e2ac4b0e6d210a14b2f1be487b84
  http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch1_powerpc.deb
    Size/MD5 checksum:   311920 f20c826b2821561036f5ff19fcf5e3d3

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9-dev_1.9.0+20060609-1etch1_s390.deb
    Size/MD5 checksum:   883230 b77c23acbd3cb613a7fa593c7b1bf7f3
  http://security.debian.org/pool/updates/main/r/ruby1.9/ruby1.9_1.9.0+20060609-1etch1_s390.deb
    Size/MD5 checksum:   234848 75d10185a3e6dba382cc58e2035421bd
  http://security.debian.org/pool/updates/main/r/ruby1.9/libgdbm-ruby1.9_1.9.0+20060609-1etch1_s390.deb
    Size/MD5 checksum:   216842 093dd943dc7e721d6b4dd56d3befebc0
  http://security.debian.org/pool/updates/main/r/ruby1.9/libtcltk-ruby1.9_1.9.0+20060609-1etch1_s390.deb
    Size/MD5 checksum:  1848348 85aaa572df8cde87d68f96b45773b44e
  http://security.debian.org/pool/updates/main/r/ruby1.9/libdbm-ruby1.9_1.9.0+20060609-1etch1_s390.deb
    Size/MD5 checksum:   217390 184dab4eb2a1f1c283ca7f8eefd66e6e
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9-dbg_1.9.0+20060609-1etch1_s390.deb
    Size/MD5 checksum:   370828 048a63b5dc4dd0f856c1104709e47e4c
  http://security.debian.org/pool/updates/main/r/ruby1.9/libruby1.9_1.9.0+20060609-1etch1_s390.deb
    Size/MD5 checksum:  1854598 a7733b20dbe1ef6a4b1bb9816ee2200e
  http://security.debian.org/pool/updates/main/r/ruby1.9/libopenssl-ruby1.9_1.9.0+20060609-1etch1_s390.deb
    Size/MD5 checksum:   327236 675462810c4a01de85938624d77a17b8
  http://security.debian.org/pool/updates/main/r/ruby1.9/libreadline-ruby1.9_1.9.0+20060609-1etch1_s390.deb
    Size/MD5 checksum:   216922 c365f4c180dff842703689d87dde31e8


  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHSEZvXm3vHE4uyloRAo5NAJ9BGlyFf3pyKCEfpG+N+4CCeL/0wwCeKyxB
W1zS5LRqAkGdhelvs+1+jVo=
=Scva
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR0oJKih9+71yA2DNAQKSsAP/f89jPhVHx/nNkMXtgjz8f6PTwiVbUVEG
XKKjH5Q6ExYboksEdVVs3B0rKqcvgOzbdJtlOo19EBgST81ParpN/GMlokj/s/5t
dq421gkeOMGg2Y+NhjW45c8N1sEuSJcnUAG6H0N6/VbCMbcKtb2CyZK1pkwZxZtr
9+ESrU8HHfs=
=fwGf
-----END PGP SIGNATURE-----