openSUSE Security Update: Security update for ruby2.1 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2017:1128-1 Rating: important References: #1014863 #1018808 #887877 #909695 #926974 #936032 #959495 #986630 Cross-References: CVE-2014-4975 CVE-2015-1855 CVE-2015-3900 CVE-2015-7551 CVE-2016-2339 Affected Products: openSUSE Leap 42.2 openSUSE Leap 42.1 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has three fixes is now available. Description: This ruby2.1 update to version 2.1.9 fixes the following issues: Security issues fixed: - CVE-2016-2339: heap overflow vulnerability in the Fiddle::Function.new"initialize" (bsc#1018808) - CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495) - CVE-2015-3900: hostname validation does not work when fetching gems or making API requests (bsc#936032) - CVE-2015-1855: Ruby'a OpenSSL extension suffers a vulnerability through overly permissive matching of hostnames (bsc#926974) - CVE-2014-4975: off-by-one stack-based buffer overflow in the encodes() function (bsc#887877) Bugfixes: - SUSEconnect doesn't handle domain wildcards in no_proxy environment variable properly (bsc#1014863) - Segmentation fault after pack & ioctl & unpack (bsc#909695) - Ruby:HTTP Header injection in 'net/http' (bsc#986630) ChangeLog: - http://svn.ruby-lang.org/repos/ruby/tags/v2_1_9/ChangeLog This update was imported from the SUSE:SLE-12:Update update project. Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE Leap 42.2: zypper in -t patch openSUSE-2017-527=1 - openSUSE Leap 42.1: zypper in -t patch openSUSE-2017-527=1 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE Leap 42.2 (i586 x86_64): libruby2_1-2_1-2.1.9-8.3.2 libruby2_1-2_1-debuginfo-2.1.9-8.3.2 ruby2.1-2.1.9-8.3.2 ruby2.1-debuginfo-2.1.9-8.3.2 ruby2.1-debugsource-2.1.9-8.3.2 ruby2.1-devel-2.1.9-8.3.2 ruby2.1-devel-extra-2.1.9-8.3.2 ruby2.1-doc-2.1.9-8.3.2 ruby2.1-stdlib-2.1.9-8.3.2 ruby2.1-stdlib-debuginfo-2.1.9-8.3.2 - openSUSE Leap 42.2 (noarch): ruby2.1-doc-ri-2.1.9-8.3.2 - openSUSE Leap 42.1 (i586 x86_64): libruby2_1-2_1-2.1.9-10.2 libruby2_1-2_1-debuginfo-2.1.9-10.2 ruby2.1-2.1.9-10.2 ruby2.1-debuginfo-2.1.9-10.2 ruby2.1-debugsource-2.1.9-10.2 ruby2.1-devel-2.1.9-10.2 ruby2.1-devel-extra-2.1.9-10.2 ruby2.1-doc-2.1.9-10.2 ruby2.1-stdlib-2.1.9-10.2 ruby2.1-stdlib-debuginfo-2.1.9-10.2 - openSUSE Leap 42.1 (noarch): ruby2.1-doc-ri-2.1.9-10.2 References: https://www.suse.com/security/cve/CVE-2014-4975.html https://www.suse.com/security/cve/CVE-2015-1855.html https://www.suse.com/security/cve/CVE-2015-3900.html https://www.suse.com/security/cve/CVE-2015-7551.html https://www.suse.com/security/cve/CVE-2016-2339.html https://bugzilla.suse.com/1014863 https://bugzilla.suse.com/1018808 https://bugzilla.suse.com/887877 https://bugzilla.suse.com/909695 https://bugzilla.suse.com/926974 https://bugzilla.suse.com/936032 https://bugzilla.suse.com/959495 https://bugzilla.suse.com/986630 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org