Mailinglist Archive: opensuse-updates (64 mails)

< Previous Next >
openSUSE-SU-2013:1611-1: moderate: update for ruby19
openSUSE Security Update: update for ruby19
______________________________________________________________________________

Announcement ID: openSUSE-SU-2013:1611-1
Rating: moderate
References: #837457 #843686
Cross-References: CVE-2013-2065 CVE-2013-4287 CVE-2013-4363

Affected Products:
openSUSE 12.3
openSUSE 12.2
______________________________________________________________________________

An update that fixes three vulnerabilities is now available.

Description:

ruby19 was updated to fix the following security issues:
- fix CVE-2013-2065: Object taint bypassing in DL and
Fiddle (bnc#843686) The file CVE-2013-2065.patch contains
the patch
- fix CVE-2013-4287 CVE-2013-4363: ruby19: Algorithmic
complexity vulnerability (bnc#837457) The file
CVE-2013-4287-4363.patch contains the patch


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 12.3:

zypper in -t patch openSUSE-2013-806

- openSUSE 12.2:

zypper in -t patch openSUSE-2013-806

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 12.3 (i586 x86_64):

ruby19-1.9.3.p392-1.13.1
ruby19-debuginfo-1.9.3.p392-1.13.1
ruby19-debugsource-1.9.3.p392-1.13.1
ruby19-devel-1.9.3.p392-1.13.1
ruby19-devel-extra-1.9.3.p392-1.13.1
ruby19-tk-1.9.3.p392-1.13.1
ruby19-tk-debuginfo-1.9.3.p392-1.13.1

- openSUSE 12.3 (noarch):

ruby19-doc-ri-1.9.3.p392-1.13.1

- openSUSE 12.2 (i586 x86_64):

ruby19-1.9.3.p392-3.30.1
ruby19-debuginfo-1.9.3.p392-3.30.1
ruby19-debugsource-1.9.3.p392-3.30.1
ruby19-devel-1.9.3.p392-3.30.1
ruby19-devel-extra-1.9.3.p392-3.30.1
ruby19-tk-1.9.3.p392-3.30.1
ruby19-tk-debuginfo-1.9.3.p392-3.30.1

- openSUSE 12.2 (noarch):

ruby19-doc-ri-1.9.3.p392-3.30.1


References:

http://support.novell.com/security/cve/CVE-2013-2065.html
http://support.novell.com/security/cve/CVE-2013-4287.html
http://support.novell.com/security/cve/CVE-2013-4363.html
https://bugzilla.novell.com/837457
https://bugzilla.novell.com/843686


< Previous Next >
This Thread
  • No further messages