[SUSE-SU-2020:1570-1] Security update for ruby2.1

Severity Important
Affected Packages 48
CVEs 42

Security update for ruby2.1

This update for ruby2.1 fixes the following issues:

Security issues fixed:

  • CVE-2015-9096: Fixed an SMTP command injection via CRLFsequences in a RCPT TO or MAIL FROM command (bsc#1043983).
  • CVE-2016-7798: Fixed an IV Reuse in GCM Mode (bsc#1055265).
  • CVE-2017-0898: Fixed a buffer underrun vulnerability in Kernel.sprintf (bsc#1058755).
  • CVE-2017-0899: Fixed an issue with malicious gem specifications, insufficient sanitation when printing gem specifications could have included terminal characters (bsc#1056286).
  • CVE-2017-0900: Fixed an issue with malicious gem specifications, the query command could have led to a denial of service attack against clients (bsc#1056286).
  • CVE-2017-0901: Fixed an issue with malicious gem specifications, potentially overwriting arbitrary files on the client system (bsc#1056286).
  • CVE-2017-0902: Fixed an issue with malicious gem specifications, that could have enabled MITM attacks against clients (bsc#1056286).
  • CVE-2017-0903: Fixed an unsafe object deserialization vulnerability (bsc#1062452).
  • CVE-2017-9228: Fixed a heap out-of-bounds write in bitset_set_range() during regex compilation (bsc#1069607).
  • CVE-2017-9229: Fixed an invalid pointer dereference in left_adjust_char_head() in oniguruma (bsc#1069632).
  • CVE-2017-10784: Fixed an escape sequence injection vulnerability in the Basic authentication of WEBrick (bsc#1058754).
  • CVE-2017-14033: Fixed a buffer underrun vulnerability in OpenSSL ASN1 decode (bsc#1058757).
  • CVE-2017-14064: Fixed an arbitrary memory exposure during a JSON.generate call (bsc#1056782).
  • CVE-2017-17405: Fixed a command injection vulnerability in Net::FTP (bsc#1073002).
  • CVE-2017-17742: Fixed an HTTP response splitting issue in WEBrick (bsc#1087434).
  • CVE-2017-17790: Fixed a command injection in lib/resolv.rb:lazy_initialize() (bsc#1078782).
  • CVE-2018-6914: Fixed an unintentional file and directory creation with directory traversal in tempfile and tmpdir (bsc#1087441).
  • CVE-2018-8777: Fixed a potential DoS caused by large requests in WEBrick (bsc#1087436).
  • CVE-2018-8778: Fixed a buffer under-read in String#unpack (bsc#1087433).
  • CVE-2018-8779: Fixed an unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (bsc#1087440).
  • CVE-2018-8780: Fixed an unintentional directory traversal by poisoned NUL byte in Dir (bsc#1087437).
  • CVE-2018-16395: Fixed an issue with OpenSSL::X509::Name equality checking (bsc#1112530).
  • CVE-2018-16396: Fixed an issue with tainted string handling, where the flag was not propagated in Array#pack and String#unpack with some directives (bsc#1112532).
  • CVE-2018-1000073: Fixed a path traversal issue (bsc#1082007).
  • CVE-2018-1000074: Fixed an unsafe object deserialization vulnerability in gem owner, allowing arbitrary code execution with specially crafted YAML (bsc#1082008).
  • CVE-2018-1000075: Fixed an infinite loop vulnerability due to negative size in tar header causes Denial of Service (bsc#1082014).
  • CVE-2018-1000076: Fixed an improper verification of signatures in tarballs (bsc#1082009).
  • CVE-2018-1000077: Fixed an improper URL validation in the homepage attribute of ruby gems (bsc#1082010).
  • CVE-2018-1000078: Fixed a XSS vulnerability in the homepage attribute when displayed via gem server (bsc#1082011).
  • CVE-2018-1000079: Fixed a path traversal issue during gem installation allows to write to arbitrary filesystem locations (bsc#1082058).
  • CVE-2019-8320: Fixed a directory traversal issue when decompressing tar files (bsc#1130627).
  • CVE-2019-8321: Fixed an escape sequence injection vulnerability in verbose (bsc#1130623).
  • CVE-2019-8322: Fixed an escape sequence injection vulnerability in gem owner (bsc#1130622).
  • CVE-2019-8323: Fixed an escape sequence injection vulnerability in API response handling (bsc#1130620).
  • CVE-2019-8324: Fixed an issue with malicious gems that may have led to arbitrary code execution (bsc#1130617).
  • CVE-2019-8325: Fixed an escape sequence injection vulnerability in errors (bsc#1130611).
  • CVE-2019-15845: Fixed a NUL injection vulnerability in File.fnmatch and File.fnmatch? (bsc#1152994).
  • CVE-2019-16201: Fixed a regular expression denial of service vulnerability in WEBrick's digest access authentication (bsc#1152995).
  • CVE-2019-16254: Fixed an HTTP response splitting vulnerability in WEBrick (bsc#1152992).
  • CVE-2019-16255: Fixed a code injection vulnerability in Shell#[] and Shell#test (bsc#1152990).
  • CVE-2020-10663: Fixed an unsafe object creation vulnerability in JSON (bsc#1171517).

Non-security issue fixed:

  • Add conflicts to libruby to make sure ruby and ruby-stdlib are also updated when libruby is updated (bsc#1048072).

Also yast2-ruby-bindings on SLES 12 SP2 LTSS was updated to handle the updated ruby interpreter. (bsc#1172275)

Package Affected Version
pkg:rpm/suse/yast2-ruby-bindings?arch=x86_64&distro=sles-12&sp=2 < 3.1.53-9.8.1
pkg:rpm/suse/yast2-ruby-bindings?arch=s390x&distro=sles-12&sp=2 < 3.1.53-9.8.1
pkg:rpm/suse/yast2-ruby-bindings?arch=ppc64le&distro=sles-12&sp=2 < 3.1.53-9.8.1
pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=2 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=2 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=2 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=2 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=2 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=2 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=2 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=2 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=3 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=2 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=5 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=4 < 2.1.9-19.3.2
pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=3 < 2.1.9-19.3.2
ID
SUSE-SU-2020:1570-1
Severity
important
URL
https://www.suse.com/support/update/announcement/2020/suse-su-20201570-1/
Published
2020-06-09T09:16:12
(4 years ago)
Modified
2020-06-09T09:16:12
(4 years ago)
Rights
Copyright 2024 SUSE LLC. All rights reserved.
Other Advisories
Source # ID Name URL
Suse SUSE ratings https://www.suse.com/support/security/rating/
Suse URL of this CSAF notice https://ftp.suse.com/pub/projects/security/csaf/suse-su-2020_1570-1.json
Suse URL for SUSE-SU-2020:1570-1 https://www.suse.com/support/update/announcement/2020/suse-su-20201570-1/
Suse E-Mail link for SUSE-SU-2020:1570-1 https://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html
Bugzilla SUSE Bug 1043983 https://bugzilla.suse.com/1043983
Bugzilla SUSE Bug 1048072 https://bugzilla.suse.com/1048072
Bugzilla SUSE Bug 1055265 https://bugzilla.suse.com/1055265
Bugzilla SUSE Bug 1056286 https://bugzilla.suse.com/1056286
Bugzilla SUSE Bug 1056782 https://bugzilla.suse.com/1056782
Bugzilla SUSE Bug 1058754 https://bugzilla.suse.com/1058754
Bugzilla SUSE Bug 1058755 https://bugzilla.suse.com/1058755
Bugzilla SUSE Bug 1058757 https://bugzilla.suse.com/1058757
Bugzilla SUSE Bug 1062452 https://bugzilla.suse.com/1062452
Bugzilla SUSE Bug 1069607 https://bugzilla.suse.com/1069607
Bugzilla SUSE Bug 1069632 https://bugzilla.suse.com/1069632
Bugzilla SUSE Bug 1073002 https://bugzilla.suse.com/1073002
Bugzilla SUSE Bug 1078782 https://bugzilla.suse.com/1078782
Bugzilla SUSE Bug 1082007 https://bugzilla.suse.com/1082007
Bugzilla SUSE Bug 1082008 https://bugzilla.suse.com/1082008
Bugzilla SUSE Bug 1082009 https://bugzilla.suse.com/1082009
Bugzilla SUSE Bug 1082010 https://bugzilla.suse.com/1082010
Bugzilla SUSE Bug 1082011 https://bugzilla.suse.com/1082011
Bugzilla SUSE Bug 1082014 https://bugzilla.suse.com/1082014
Bugzilla SUSE Bug 1082058 https://bugzilla.suse.com/1082058
Bugzilla SUSE Bug 1087433 https://bugzilla.suse.com/1087433
Bugzilla SUSE Bug 1087434 https://bugzilla.suse.com/1087434
Bugzilla SUSE Bug 1087436 https://bugzilla.suse.com/1087436
Bugzilla SUSE Bug 1087437 https://bugzilla.suse.com/1087437
Bugzilla SUSE Bug 1087440 https://bugzilla.suse.com/1087440
Bugzilla SUSE Bug 1087441 https://bugzilla.suse.com/1087441
Bugzilla SUSE Bug 1112530 https://bugzilla.suse.com/1112530
Bugzilla SUSE Bug 1112532 https://bugzilla.suse.com/1112532
Bugzilla SUSE Bug 1130611 https://bugzilla.suse.com/1130611
Bugzilla SUSE Bug 1130617 https://bugzilla.suse.com/1130617
Bugzilla SUSE Bug 1130620 https://bugzilla.suse.com/1130620
Bugzilla SUSE Bug 1130622 https://bugzilla.suse.com/1130622
Bugzilla SUSE Bug 1130623 https://bugzilla.suse.com/1130623
Bugzilla SUSE Bug 1130627 https://bugzilla.suse.com/1130627
Bugzilla SUSE Bug 1152990 https://bugzilla.suse.com/1152990
Bugzilla SUSE Bug 1152992 https://bugzilla.suse.com/1152992
Bugzilla SUSE Bug 1152994 https://bugzilla.suse.com/1152994
Bugzilla SUSE Bug 1152995 https://bugzilla.suse.com/1152995
Bugzilla SUSE Bug 1171517 https://bugzilla.suse.com/1171517
Bugzilla SUSE Bug 1172275 https://bugzilla.suse.com/1172275
CVE SUSE CVE CVE-2015-9096 page https://www.suse.com/security/cve/CVE-2015-9096/
CVE SUSE CVE CVE-2016-2339 page https://www.suse.com/security/cve/CVE-2016-2339/
CVE SUSE CVE CVE-2016-7798 page https://www.suse.com/security/cve/CVE-2016-7798/
CVE SUSE CVE CVE-2017-0898 page https://www.suse.com/security/cve/CVE-2017-0898/
CVE SUSE CVE CVE-2017-0899 page https://www.suse.com/security/cve/CVE-2017-0899/
CVE SUSE CVE CVE-2017-0900 page https://www.suse.com/security/cve/CVE-2017-0900/
CVE SUSE CVE CVE-2017-0901 page https://www.suse.com/security/cve/CVE-2017-0901/
CVE SUSE CVE CVE-2017-0902 page https://www.suse.com/security/cve/CVE-2017-0902/
CVE SUSE CVE CVE-2017-0903 page https://www.suse.com/security/cve/CVE-2017-0903/
CVE SUSE CVE CVE-2017-10784 page https://www.suse.com/security/cve/CVE-2017-10784/
CVE SUSE CVE CVE-2017-14033 page https://www.suse.com/security/cve/CVE-2017-14033/
CVE SUSE CVE CVE-2017-14064 page https://www.suse.com/security/cve/CVE-2017-14064/
CVE SUSE CVE CVE-2017-17405 page https://www.suse.com/security/cve/CVE-2017-17405/
CVE SUSE CVE CVE-2017-17742 page https://www.suse.com/security/cve/CVE-2017-17742/
CVE SUSE CVE CVE-2017-17790 page https://www.suse.com/security/cve/CVE-2017-17790/
CVE SUSE CVE CVE-2017-9228 page https://www.suse.com/security/cve/CVE-2017-9228/
CVE SUSE CVE CVE-2017-9229 page https://www.suse.com/security/cve/CVE-2017-9229/
CVE SUSE CVE CVE-2018-1000073 page https://www.suse.com/security/cve/CVE-2018-1000073/
CVE SUSE CVE CVE-2018-1000074 page https://www.suse.com/security/cve/CVE-2018-1000074/
CVE SUSE CVE CVE-2018-1000075 page https://www.suse.com/security/cve/CVE-2018-1000075/
CVE SUSE CVE CVE-2018-1000076 page https://www.suse.com/security/cve/CVE-2018-1000076/
CVE SUSE CVE CVE-2018-1000077 page https://www.suse.com/security/cve/CVE-2018-1000077/
CVE SUSE CVE CVE-2018-1000078 page https://www.suse.com/security/cve/CVE-2018-1000078/
CVE SUSE CVE CVE-2018-1000079 page https://www.suse.com/security/cve/CVE-2018-1000079/
CVE SUSE CVE CVE-2018-16395 page https://www.suse.com/security/cve/CVE-2018-16395/
CVE SUSE CVE CVE-2018-16396 page https://www.suse.com/security/cve/CVE-2018-16396/
CVE SUSE CVE CVE-2018-6914 page https://www.suse.com/security/cve/CVE-2018-6914/
CVE SUSE CVE CVE-2018-8777 page https://www.suse.com/security/cve/CVE-2018-8777/
CVE SUSE CVE CVE-2018-8778 page https://www.suse.com/security/cve/CVE-2018-8778/
CVE SUSE CVE CVE-2018-8779 page https://www.suse.com/security/cve/CVE-2018-8779/
CVE SUSE CVE CVE-2018-8780 page https://www.suse.com/security/cve/CVE-2018-8780/
CVE SUSE CVE CVE-2019-15845 page https://www.suse.com/security/cve/CVE-2019-15845/
CVE SUSE CVE CVE-2019-16201 page https://www.suse.com/security/cve/CVE-2019-16201/
CVE SUSE CVE CVE-2019-16254 page https://www.suse.com/security/cve/CVE-2019-16254/
CVE SUSE CVE CVE-2019-16255 page https://www.suse.com/security/cve/CVE-2019-16255/
CVE SUSE CVE CVE-2019-8320 page https://www.suse.com/security/cve/CVE-2019-8320/
CVE SUSE CVE CVE-2019-8321 page https://www.suse.com/security/cve/CVE-2019-8321/
CVE SUSE CVE CVE-2019-8322 page https://www.suse.com/security/cve/CVE-2019-8322/
CVE SUSE CVE CVE-2019-8323 page https://www.suse.com/security/cve/CVE-2019-8323/
CVE SUSE CVE CVE-2019-8324 page https://www.suse.com/security/cve/CVE-2019-8324/
CVE SUSE CVE CVE-2019-8325 page https://www.suse.com/security/cve/CVE-2019-8325/
CVE SUSE CVE CVE-2020-10663 page https://www.suse.com/security/cve/CVE-2020-10663/
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/suse/yast2-ruby-bindings?arch=x86_64&distro=sles-12&sp=2 suse yast2-ruby-bindings < 3.1.53-9.8.1 sles-12 x86_64
Affected pkg:rpm/suse/yast2-ruby-bindings?arch=s390x&distro=sles-12&sp=2 suse yast2-ruby-bindings < 3.1.53-9.8.1 sles-12 s390x
Affected pkg:rpm/suse/yast2-ruby-bindings?arch=ppc64le&distro=sles-12&sp=2 suse yast2-ruby-bindings < 3.1.53-9.8.1 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=5 suse ruby2.1 < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=4 suse ruby2.1 < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=3 suse ruby2.1 < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1?arch=x86_64&distro=sles-12&sp=2 suse ruby2.1 < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=5 suse ruby2.1 < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=4 suse ruby2.1 < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=3 suse ruby2.1 < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1?arch=s390x&distro=sles-12&sp=2 suse ruby2.1 < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=5 suse ruby2.1 < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=4 suse ruby2.1 < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=3 suse ruby2.1 < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1?arch=ppc64le&distro=sles-12&sp=2 suse ruby2.1 < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=5 suse ruby2.1 < 2.1.9-19.3.2 sles-12 aarch64
Affected pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=4 suse ruby2.1 < 2.1.9-19.3.2 sles-12 aarch64
Affected pkg:rpm/suse/ruby2.1?arch=aarch64&distro=sles-12&sp=3 suse ruby2.1 < 2.1.9-19.3.2 sles-12 aarch64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=5 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=4 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=3 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=x86_64&distro=sles-12&sp=2 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=5 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=4 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=3 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=s390x&distro=sles-12&sp=2 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=5 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=4 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=3 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=ppc64le&distro=sles-12&sp=2 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=5 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 aarch64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=4 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 aarch64
Affected pkg:rpm/suse/ruby2.1-stdlib?arch=aarch64&distro=sles-12&sp=3 suse ruby2.1-stdlib < 2.1.9-19.3.2 sles-12 aarch64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=5 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=4 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=3 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=x86_64&distro=sles-12&sp=2 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 x86_64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=5 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=4 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=3 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/libruby2_1-2_1?arch=s390x&distro=sles-12&sp=2 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 s390x
Affected pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=5 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=4 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=3 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/libruby2_1-2_1?arch=ppc64le&distro=sles-12&sp=2 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 ppc64le
Affected pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=5 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 aarch64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=4 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 aarch64
Affected pkg:rpm/suse/libruby2_1-2_1?arch=aarch64&distro=sles-12&sp=3 suse libruby2_1-2_1 < 2.1.9-19.3.2 sles-12 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...