Security update for ruby
SUSE Security Update: Security update for ruby
Ruby received an LTSS roll-up update to fix the following security issues:
* CVE-2012-4481: The safe-level feature in Ruby 1.8.7 allowed
context-dependent attackers to modify strings via the NameError#to_s
method when operating on Ruby objects.
* CVE-2013-1821: A ruby entity expansion DoS vulnerability in REXML
was fixed.
* CVE-2013-4164: Fixed a heap overflow in float point parsing.
* CVE-2013-4073: Fixed hostname check bypassing vulnerability in the
SSL client.
Security Issues references:
* CVE-2012-4481
* CVE-2013-4073
* CVE-2013-4164
* CVE-2013-1821
Announcement ID: | SUSE-SU-2014:0844-1 |
Rating: | moderate |
References: | #783525 #808137 #827265 #851803 |
Affected Products: |
An update that fixes four vulnerabilities is now available. It includes one version update.
Description:
Ruby received an LTSS roll-up update to fix the following security issues:
* CVE-2012-4481: The safe-level feature in Ruby 1.8.7 allowed
context-dependent attackers to modify strings via the NameError#to_s
method when operating on Ruby objects.
* CVE-2013-1821: A ruby entity expansion DoS vulnerability in REXML
was fixed.
* CVE-2013-4164: Fixed a heap overflow in float point parsing.
* CVE-2013-4073: Fixed hostname check bypassing vulnerability in the
SSL client.
Security Issues references:
* CVE-2012-4481
* CVE-2013-4073
* CVE-2013-4164
* CVE-2013-1821
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Server 11 SP1 LTSS:
zypper in -t patch slessp1-ruby-9312
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 1.8.7.p357]:
- ruby-1.8.7.p357-0.9.15.6
- ruby-doc-html-1.8.7.p357-0.9.15.6
- ruby-tk-1.8.7.p357-0.9.15.6
References:
- http://support.novell.com/security/cve/CVE-2012-4481.html
- http://support.novell.com/security/cve/CVE-2013-1821.html
- http://support.novell.com/security/cve/CVE-2013-4073.html
- http://support.novell.com/security/cve/CVE-2013-4164.html
- https://bugzilla.novell.com/783525
- https://bugzilla.novell.com/808137
- https://bugzilla.novell.com/827265
- https://bugzilla.novell.com/851803
- http://download.suse.com/patch/finder/?keywords=9bc15e1f428f15de04cd5d99f4b7aa3d