SUSE-RU-2017:3408-1: moderate: Recommended update for rubygem-yajl-ruby
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu Dec 21 13:13:25 MST 2017
SUSE Recommended Update: Recommended update for rubygem-yajl-ruby
______________________________________________________________________________
Announcement ID: SUSE-RU-2017:3408-1
Rating: moderate
References: #1066565
Affected Products:
SUSE OpenStack Cloud 7
SUSE OpenStack Cloud 6
SUSE Enterprise Storage 4
SUSE Enterprise Storage 3
______________________________________________________________________________
An update that fixes one vulnerability is now available.
Description:
This update for rubygem-yajl-ruby provides the following fixes:
- Update to version 1.3.1
- Fix crafted JSON file allows to crash ruby process with a SIGABRT
(bsc#1066565, CVE-2017-1651)
Patch Instructions:
To install this SUSE Recommended Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud 7:
zypper in -t patch SUSE-OpenStack-Cloud-7-2017-2136=1
- SUSE OpenStack Cloud 6:
zypper in -t patch SUSE-OpenStack-Cloud-6-2017-2136=1
- SUSE Enterprise Storage 4:
zypper in -t patch SUSE-Storage-4-2017-2136=1
- SUSE Enterprise Storage 3:
zypper in -t patch SUSE-Storage-3-2017-2136=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE OpenStack Cloud 7 (aarch64 s390x x86_64):
ruby2.1-rubygem-yajl-ruby-1.3.1-4.3.2
ruby2.1-rubygem-yajl-ruby-debuginfo-1.3.1-4.3.2
rubygem-yajl-ruby-debugsource-1.3.1-4.3.2
- SUSE OpenStack Cloud 6 (x86_64):
ruby2.1-rubygem-yajl-ruby-1.3.1-4.3.2
ruby2.1-rubygem-yajl-ruby-debuginfo-1.3.1-4.3.2
rubygem-yajl-ruby-debugsource-1.3.1-4.3.2
- SUSE Enterprise Storage 4 (aarch64 x86_64):
ruby2.1-rubygem-yajl-ruby-1.3.1-4.3.2
ruby2.1-rubygem-yajl-ruby-debuginfo-1.3.1-4.3.2
rubygem-yajl-ruby-debugsource-1.3.1-4.3.2
- SUSE Enterprise Storage 3 (aarch64 x86_64):
ruby2.1-rubygem-yajl-ruby-1.3.1-4.3.2
ruby2.1-rubygem-yajl-ruby-debuginfo-1.3.1-4.3.2
rubygem-yajl-ruby-debugsource-1.3.1-4.3.2
References:
https://www.suse.com/security/cve/CVE-2017-1651.html
https://bugzilla.suse.com/1066565
More information about the sle-updates
mailing list