[SUSE-SU-2017:1067-1] Security update for ruby2.1

Severity Important
Affected Packages 27
CVEs 5

Security update for ruby2.1

This ruby2.1 update to version 2.1.9 fixes the following issues:

Security issues fixed:
- CVE-2016-2339: heap overflow vulnerability in the Fiddle::Function.new'initialize' (bsc#1018808)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)
- CVE-2015-3900: hostname validation does not work when fetching gems or making API requests (bsc#936032)
- CVE-2015-1855: Ruby'a OpenSSL extension suffers a vulnerability through overly permissive matching of
hostnames (bsc#926974)
- CVE-2014-4975: off-by-one stack-based buffer overflow in the encodes() function (bsc#887877)

Bugfixes:
- SUSEconnect doesn't handle domain wildcards in no_proxy environment variable properly (bsc#1014863)
- Segmentation fault after pack & ioctl & unpack (bsc#909695)
- Ruby:HTTP Header injection in 'net/http' (bsc#986630)

ChangeLog:
- http://svn.ruby-lang.org/repos/ruby/tags/v2_1_9/ChangeLog

Package Affected Version
pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sled-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sled-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sled-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sled-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sled-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sled-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=2 < 2.1.9-15.1
pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=1 < 2.1.9-15.1
pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=2 < 2.1.9-15.1
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=2 suse ruby2.1 < 2.1.9-15.1 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=1 suse ruby2.1 < 2.1.9-15.1 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sled-12&sp=2 suse ruby2.1 < 2.1.9-15.1 sled-12 x86_64
Affected pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sled-12&sp=1 suse ruby2.1 < 2.1.9-15.1 sled-12 x86_64
Affected pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=2 suse ruby2.1 < 2.1.9-15.1 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=1 suse ruby2.1 < 2.1.9-15.1 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=2 suse ruby2.1 < 2.1.9-15.1 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=1 suse ruby2.1 < 2.1.9-15.1 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=2 suse ruby2.1 < 2.1.9-15.1 sles-12 aarch64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=2 suse ruby2.1-stdlib < 2.1.9-15.1 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=1 suse ruby2.1-stdlib < 2.1.9-15.1 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sled-12&sp=2 suse ruby2.1-stdlib < 2.1.9-15.1 sled-12 x86_64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sled-12&sp=1 suse ruby2.1-stdlib < 2.1.9-15.1 sled-12 x86_64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=2 suse ruby2.1-stdlib < 2.1.9-15.1 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=1 suse ruby2.1-stdlib < 2.1.9-15.1 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=2 suse ruby2.1-stdlib < 2.1.9-15.1 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=1 suse ruby2.1-stdlib < 2.1.9-15.1 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=2 suse ruby2.1-stdlib < 2.1.9-15.1 sles-12 aarch64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=2 suse libruby2_1-2_1 < 2.1.9-15.1 sles-12 x86_64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=1 suse libruby2_1-2_1 < 2.1.9-15.1 sles-12 x86_64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sled-12&sp=2 suse libruby2_1-2_1 < 2.1.9-15.1 sled-12 x86_64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sled-12&sp=1 suse libruby2_1-2_1 < 2.1.9-15.1 sled-12 x86_64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=2 suse libruby2_1-2_1 < 2.1.9-15.1 sles-12 s390x
Affected pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=1 suse libruby2_1-2_1 < 2.1.9-15.1 sles-12 s390x
Affected pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=2 suse libruby2_1-2_1 < 2.1.9-15.1 sles-12 ppc64le
Affected pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=1 suse libruby2_1-2_1 < 2.1.9-15.1 sles-12 ppc64le
Affected pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=2 suse libruby2_1-2_1 < 2.1.9-15.1 sles-12 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...