SUSE-SU-2013:1659-1: moderate: Security update for ruby19

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue Nov 12 11:04:12 MST 2013


   SUSE Security Update: Security update for ruby19
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:1659-1
Rating:             moderate
References:         #837457 #843686 
Cross-References:   CVE-2013-2065 CVE-2013-4287 CVE-2013-4363
                   
Affected Products:
                    SUSE Studio Onsite 1.3
______________________________________________________________________________

   An update that fixes three vulnerabilities is now
   available. It includes one version update.

Description:


   ruby19 has been updated to fix two security issues:

   * CVE-2013-2065: Object tainting was able to be
   bypassed in the DL and Fiddle modules.
   * CVE-2013-4287 CVE-2013-4363: An algorithmic
   complexity vulnerability within regular expression version
   checks has been fixed.

   Security Issue references:

   * CVE-2013-2065
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2065
   >
   * CVE-2013-4287
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4287
   >
   * CVE-2013-4363
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4363
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Studio Onsite 1.3:

      zypper in -t patch slestso13-ruby19-8459

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Studio Onsite 1.3 (x86_64) [New Version: 1.9.3.p392]:

      ruby19-1.9.3.p392-0.13.1
      ruby19-devel-1.9.3.p392-0.13.1
      ruby19-devel-extra-1.9.3.p392-0.13.1


References:

   http://support.novell.com/security/cve/CVE-2013-2065.html
   http://support.novell.com/security/cve/CVE-2013-4287.html
   http://support.novell.com/security/cve/CVE-2013-4363.html
   https://bugzilla.novell.com/837457
   https://bugzilla.novell.com/843686
   http://download.novell.com/patch/finder/?keywords=6292f0ada7ba6c2a2118037992be516a



More information about the sle-security-updates mailing list