openSUSE Security Update : ruby19 (openSUSE-SU-2013:1611-1)

medium Nessus Plugin ID 75178


The remote openSUSE host is missing a security update.


ruby19 was updated to fix the following security issues :

- fix CVE-2013-2065: Object taint bypassing in DL and Fiddle (bnc#843686) The file CVE-2013-2065.patch contains the patch

- fix CVE-2013-4287 CVE-2013-4363: ruby19: Algorithmic complexity vulnerability (bnc#837457) The file CVE-2013-4287-4363.patch contains the patch


Update the affected ruby19 packages.

See Also

Plugin Details

Severity: Medium

ID: 75178

File Name: openSUSE-2013-806.nasl

Version: 1.7

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Nessus Agent

Risk Information


Risk Factor: Low

Score: 3.7


Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:ruby19, p-cpe:/a:novell:opensuse:ruby19-debuginfo, p-cpe:/a:novell:opensuse:ruby19-debugsource, p-cpe:/a:novell:opensuse:ruby19-devel, p-cpe:/a:novell:opensuse:ruby19-devel-extra, p-cpe:/a:novell:opensuse:ruby19-doc-ri, p-cpe:/a:novell:opensuse:ruby19-tk, p-cpe:/a:novell:opensuse:ruby19-tk-debuginfo, cpe:/o:novell:opensuse:12.2, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 10/22/2013

Reference Information

CVE: CVE-2013-2065, CVE-2013-4287, CVE-2013-4363

BID: 59881, 62281, 62442