[SSA:2017-261-03] ruby
New ruby packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog
patches/packages/ruby-2.2.8-i586-1_slack14.2.txz: Upgraded.
This release includes several security fixes.
For more information, see:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10784
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14033
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064
(* Security fix *)
Where to find the new packages
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated package for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/ruby-2.2.8-i586-1_slack14.2.txz
Updated package for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/ruby-2.2.8-x86_64-1_slack14.2.txz
Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/ruby-2.4.2-i586-1.txz
Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/ruby-2.4.2-x86_64-1.txz
MD5 signatures
Slackware 14.2 package:
2075dcd60f69c74746bbafa2815bfaf3 ruby-2.2.8-i586-1_slack14.2.txz
Slackware x86_64 14.2 package:
32c1da6bf7c4fcd43bad4c0f8bbba9f4 ruby-2.2.8-x86_64-1_slack14.2.txz
Slackware -current package:
989ad7b1339640d49d7bae34adae727a d/ruby-2.4.2-i586-1.txz
Slackware x86_64 -current package:
b19b4191baf1c0e340a1f1d5c4034b4c d/ruby-2.4.2-x86_64-1.txz
Installation instructions
Upgrade the package as root:
# upgradepkg ruby-2.2.8-i586-1_slack14.2.txz
- ID
- SSA:2017-261-03
- Severity
- critical
- Severity from
- CVE-2017-0899
- URL
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2017&m=slackware-security.371069
- Published
-
2017-09-18T19:20:47
(7 years ago) - Modified
-
2017-09-18T19:20:47
(7 years ago) - Rights
- Slackware Linux Security Team
- Other Advisories
-
- ALAS-2017-906
- ALAS-2017-915
- ALPINE:CVE-2017-0898
- ALPINE:CVE-2017-0899
- ALPINE:CVE-2017-0900
- ALPINE:CVE-2017-0901
- ALPINE:CVE-2017-0902
- ALPINE:CVE-2017-10784
- ALPINE:CVE-2017-14033
- ALPINE:CVE-2017-14064
- DSA-3966-1
- DSA-4031-1
- ELSA-2018-0378
- FEDORA-2017-20214ad330
- FEDORA-2017-4166994614
- FEDORA-2017-6e6f4f95e6
- FEDORA-2017-81cf93b7c2
- FEDORA-2017-e136d63c99
- FREEBSD:95B01379-9D52-11E7-A25C-471BAFC3262F
- GLSA-201710-01
- GLSA-201710-18
- RHSA-2018:0378
- RUBYSEC:OPENSSL-2017-14033
- RUBYSEC:RUBYGEMS-UPDATE-2017-0899
- RUBYSEC:RUBYGEMS-UPDATE-2017-0900
- RUBYSEC:RUBYGEMS-UPDATE-2017-0901
- RUBYSEC:RUBYGEMS-UPDATE-2017-0902
- RUBYSEC:WEBRICK-2017-10784
- SUSE-SU-2020:1570-1
- USN-3439-1
- USN-3528-1
- USN-3553-1
- USN-3685-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:slackbuild/slackware/ruby?arch=x86_64&distro=slackware64-current | slackware | ruby | < 2.4.2 | slackware64-current | x86_64 | |
Affected | pkg:slackbuild/slackware/ruby?arch=x86_64&distro=slackware64-14.2 | slackware | ruby | < 2.2.8 | slackware64-14.2 | x86_64 | |
Affected | pkg:slackbuild/slackware/ruby?arch=i586&distro=slackware-current | slackware | ruby | < 2.4.2 | slackware-current | i586 | |
Affected | pkg:slackbuild/slackware/ruby?arch=i586&distro=slackware-14.2 | slackware | ruby | < 2.2.8 | slackware-14.2 | i586 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |