Nacionalni CERT

Sigurnosni nedostaci programskog paketa ruby2.1

<p>SUSE Security Update: Security update for ruby2.1<br />______________________________________________________________________________<br /><br />Announcement ID: SUSE-SU-2017:1067-1<br />Rating: important<br />References: #1014863 #1018808 #887877 #909695 #926974 <br /> #936032 #959495 #986630 <br />Cross-References: CVE-2014-4975 CVE-2015-1855 CVE-2015-3900<br /> CVE-2015-7551 CVE-2016-2339<br />Affected Products:<br /> SUSE Linux Enterprise Software Development Kit 12-SP2<br /> SUSE Linux Enterprise Software Development Kit 12-SP1<br /> SUSE Linux Enterprise Server for Raspberry Pi 12-SP2<br /> SUSE Linux Enterprise Server 12-SP2<br /> SUSE Linux Enterprise Server 12-SP1<br /> SUSE Linux Enterprise Desktop 12-SP2<br /> SUSE Linux Enterprise Desktop 12-SP1<br /> OpenStack Cloud Magnum Orchestration 7<br />______________________________________________________________________________<br /><br /> An update that solves 5 vulnerabilities and has three fixes<br /> is now available.<br /><br />Description:<br /><br /><br /> This ruby2.1 update to version 2.1.9 fixes the following issues:<br /><br /> Security issues fixed:<br /> - CVE-2016-2339: heap overflow vulnerability in the<br /> Fiddle::Function.new"initialize" (bsc#1018808)<br /> - CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)<br /> - CVE-2015-3900: hostname validation does not work when fetching gems or<br /> making API requests (bsc#936032)<br /> - CVE-2015-1855: Ruby'a OpenSSL extension suffers a vulnerability through<br /> overly permissive matching of hostnames (bsc#926974)<br /> - CVE-2014-4975: off-by-one stack-based buffer overflow in the encodes()<br /> function (bsc#887877)<br /><br /> Bugfixes:<br /> - SUSEconnect doesn't handle domain wildcards in no_proxy environment<br /> variable properly (bsc#1014863)<br /> - Segmentation fault after pack & ioctl & unpack (bsc#909695)<br /> - Ruby:HTTP Header injection in 'net/http' (bsc#986630)<br /><br /> ChangeLog:<br /> - http://svn.ruby-lang.org/repos/ruby/tags/v2_1_9/ChangeLog<br /><br /><br />Patch Instructions:<br /><br /> To install this SUSE Security Update use YaST online_update.<br /> Alternatively you can run the command listed for your product:<br /><br /> - SUSE Linux Enterprise Software Development Kit 12-SP2:<br /><br /> zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-624=1<br /><br /> - SUSE Linux Enterprise Software Development Kit 12-SP1:<br /><br /> zypper in -t patch SUSE-SLE-SDK-12-SP1-2017-624=1<br /><br /> - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:<br /><br /> zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-624=1<br /><br /> - SUSE Linux Enterprise Server 12-SP2:<br /><br /> zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-624=1<br /><br /> - SUSE Linux Enterprise Server 12-SP1:<br /><br /> zypper in -t patch SUSE-SLE-SERVER-12-SP1-2017-624=1<br /><br /> - SUSE Linux Enterprise Desktop 12-SP2:<br /><br /> zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-624=1<br /><br /> - SUSE Linux Enterprise Desktop 12-SP1:<br /><br /> zypper in -t patch SUSE-SLE-DESKTOP-12-SP1-2017-624=1<br /><br /> - OpenStack Cloud Magnum Orchestration 7:<br /><br /> zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-624=1<br /><br /> To bring your system up-to-date, use "zypper patch".<br /><br /><br />Package List:<br /><br /> - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):<br /><br /> ruby2.1-debuginfo-2.1.9-15.1<br /> ruby2.1-debugsource-2.1.9-15.1<br /> ruby2.1-devel-2.1.9-15.1<br /><br /> - SUSE Linux Enterprise Software Development Kit 12-SP1 (ppc64le s390x x86_64):<br /><br /> ruby2.1-debuginfo-2.1.9-15.1<br /> ruby2.1-debugsource-2.1.9-15.1<br /> ruby2.1-devel-2.1.9-15.1<br /><br /> - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):<br /><br /> libruby2_1-2_1-2.1.9-15.1<br /> libruby2_1-2_1-debuginfo-2.1.9-15.1<br /> ruby2.1-2.1.9-15.1<br /> ruby2.1-debuginfo-2.1.9-15.1<br /> ruby2.1-debugsource-2.1.9-15.1<br /> ruby2.1-stdlib-2.1.9-15.1<br /> ruby2.1-stdlib-debuginfo-2.1.9-15.1<br /><br /> - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):<br /><br /> libruby2_1-2_1-2.1.9-15.1<br /> libruby2_1-2_1-debuginfo-2.1.9-15.1<br /> ruby2.1-2.1.9-15.1<br /> ruby2.1-debuginfo-2.1.9-15.1<br /> ruby2.1-debugsource-2.1.9-15.1<br /> ruby2.1-stdlib-2.1.9-15.1<br /> ruby2.1-stdlib-debuginfo-2.1.9-15.1<br /><br /> - SUSE Linux Enterprise Server 12-SP1 (ppc64le s390x x86_64):<br /><br /> libruby2_1-2_1-2.1.9-15.1<br /> libruby2_1-2_1-debuginfo-2.1.9-15.1<br /> ruby2.1-2.1.9-15.1<br /> ruby2.1-debuginfo-2.1.9-15.1<br /> ruby2.1-debugsource-2.1.9-15.1<br /> ruby2.1-stdlib-2.1.9-15.1<br /> ruby2.1-stdlib-debuginfo-2.1.9-15.1<br /><br /> - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):<br /><br /> libruby2_1-2_1-2.1.9-15.1<br /> libruby2_1-2_1-debuginfo-2.1.9-15.1<br /> ruby2.1-2.1.9-15.1<br /> ruby2.1-debuginfo-2.1.9-15.1<br /> ruby2.1-debugsource-2.1.9-15.1<br /> ruby2.1-stdlib-2.1.9-15.1<br /> ruby2.1-stdlib-debuginfo-2.1.9-15.1<br /><br /> - SUSE Linux Enterprise Desktop 12-SP1 (x86_64):<br /><br /> libruby2_1-2_1-2.1.9-15.1<br /> libruby2_1-2_1-debuginfo-2.1.9-15.1<br /> ruby2.1-2.1.9-15.1<br /> ruby2.1-debuginfo-2.1.9-15.1<br /> ruby2.1-debugsource-2.1.9-15.1<br /> ruby2.1-stdlib-2.1.9-15.1<br /> ruby2.1-stdlib-debuginfo-2.1.9-15.1<br /><br /> - OpenStack Cloud Magnum Orchestration 7 (x86_64):<br /><br /> libruby2_1-2_1-2.1.9-15.1<br /> libruby2_1-2_1-debuginfo-2.1.9-15.1<br /> ruby2.1-2.1.9-15.1<br /> ruby2.1-debuginfo-2.1.9-15.1<br /> ruby2.1-debugsource-2.1.9-15.1<br /> ruby2.1-stdlib-2.1.9-15.1<br /> ruby2.1-stdlib-debuginfo-2.1.9-15.1<br /><br /><br />References:<br /><br /> https://www.suse.com/security/cve/CVE-2014-4975.html<br /> https://www.suse.com/security/cve/CVE-2015-1855.html<br /> https://www.suse.com/security/cve/CVE-2015-3900.html<br /> https://www.suse.com/security/cve/CVE-2015-7551.html<br /> https://www.suse.com/security/cve/CVE-2016-2339.html<br /> https://bugzilla.suse.com/1014863<br /> https://bugzilla.suse.com/1018808<br /> https://bugzilla.suse.com/887877<br /> https://bugzilla.suse.com/909695<br /> https://bugzilla.suse.com/926974<br /> https://bugzilla.suse.com/936032<br /> https://bugzilla.suse.com/959495<br /> https://bugzilla.suse.com/986630<br /><br />-- <br />To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org<br />For additional commands, e-mail: opensuse-security-announce+help@opensuse.org</p>
Otkriveni su sigurnosni nedostaci u programskom paketu ruby2.1 za operacijski sustav SUSE. Otkriveni nedostaci potencijalnim napadačima omogućuju otkrivanje osjetljivih informacija, izvršavanje proizvoljnog programskog koda, izvođenje napada uskraćivanja usluge te preusmjeravanje zahtjeva prema proizvoljnim domenama pomoću posebno oblikovanog DNS SRV zapisa ("DNS hijacking"). Savjetuje se ažuriranje izdanim zakrpama.