openSUSE Security Update : ruby2.1 (openSUSE-2017-527)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This ruby2.1 update to version 2.1.9 fixes the following issues :

Security issues fixed :

- CVE-2016-2339: heap overflow vulnerability in the'initialize' (bsc#1018808)

- CVE-2015-7551: Unsafe tainted string usage in Fiddle and
DL (bsc#959495)

- CVE-2015-3900: hostname validation does not work when
fetching gems or making API requests (bsc#936032)

- CVE-2015-1855: Ruby'a OpenSSL extension suffers a
vulnerability through overly permissive matching of
hostnames (bsc#926974)

- CVE-2014-4975: off-by-one stack-based buffer overflow in
the encodes() function (bsc#887877)

Bugfixes :

- SUSEconnect doesn't handle domain wildcards in no_proxy
environment variable properly (bsc#1014863)

- Segmentation fault after pack & ioctl & unpack

- Ruby:HTTP Header injection in 'net/http' (bsc#986630)

ChangeLog :


This update was imported from the SUSE:SLE-12:Update update project.

See also :

Solution :

Update the affected ruby2.1 packages.

Risk factor :

High / CVSS Base Score : 7.5

Family: SuSE Local Security Checks

Nessus Plugin ID: 99753 ()

Bugtraq ID:

CVE ID: CVE-2014-4975

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now