SuSE 11.1 Security Update : ruby (SAT Patch Number 5716)

High Nessus Plugin ID 57840

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

This update of ruby provides 1.8.7p357, which contains many stability fixes and bug fixes while maintaining full compatibility with the previous version. A detailailed list of changes is available from http://svn.ruby-lang.org/repos/ruby/tags/v1_8_7_357/ChangeLog .

The most important fixes are :

- Hash functions are now using a randomized seed to avoid algorithmic complexity attacks. If available, OpenSSL::Random.seed at the SecureRandom.random_bytes is used to achieve this. (CVE-2011-4815)

- mkconfig.rb: fix for continued lines.

- Fix Infinity to be greater than any bignum number.

- Initialize store->ex_data.sk.

- Several IPv6 related fixes.

- Fixes for zlib.

- Reinitialize PRNG when forking children. (CVE-2011-2686 / CVE-2011-3009)

- Fixes to securerandom. (CVE-2011-2705)

- Fix uri route_to

- Fix race condition with variables and autoload.

Solution

Apply SAT patch number 5716.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=704409

https://bugzilla.novell.com/show_bug.cgi?id=739122

https://bugzilla.novell.com/show_bug.cgi?id=740796

http://support.novell.com/security/cve/CVE-2011-2686.html

http://support.novell.com/security/cve/CVE-2011-2705.html

http://support.novell.com/security/cve/CVE-2011-3009.html

http://support.novell.com/security/cve/CVE-2011-4815.html

Plugin Details

Severity: High

ID: 57840

File Name: suse_11_ruby-187p357-120126.nasl

Version: 1.4

Type: local

Agent: unix

Published: 2012/02/06

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:ruby, p-cpe:/a:novell:suse_linux:11:ruby-doc-html, p-cpe:/a:novell:suse_linux:11:ruby-tk, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Patch Publication Date: 2012/01/26

Reference Information

CVE: CVE-2011-2686, CVE-2011-2705, CVE-2011-3009, CVE-2011-4815