Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:1067-1

Опубликовано: 20 апр. 2017
Источник: suse-cvrf

Описание

Security update for ruby2.1

This ruby2.1 update to version 2.1.9 fixes the following issues:

Security issues fixed:

  • CVE-2016-2339: heap overflow vulnerability in the Fiddle::Function.new'initialize' (bsc#1018808)
  • CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)
  • CVE-2015-3900: hostname validation does not work when fetching gems or making API requests (bsc#936032)
  • CVE-2015-1855: Ruby'a OpenSSL extension suffers a vulnerability through overly permissive matching of hostnames (bsc#926974)
  • CVE-2014-4975: off-by-one stack-based buffer overflow in the encodes() function (bsc#887877)

Bugfixes:

  • SUSEconnect doesn't handle domain wildcards in no_proxy environment variable properly (bsc#1014863)
  • Segmentation fault after pack & ioctl & unpack (bsc#909695)
  • Ruby:HTTP Header injection in 'net/http' (bsc#986630)

ChangeLog:

Список пакетов

SUSE Linux Enterprise Desktop 12 SP1
libruby2_1-2_1-2.1.9-15.1
ruby2.1-2.1.9-15.1
ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP2
libruby2_1-2_1-2.1.9-15.1
ruby2.1-2.1.9-15.1
ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Server 12 SP1
libruby2_1-2_1-2.1.9-15.1
ruby2.1-2.1.9-15.1
ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Server 12 SP2
libruby2_1-2_1-2.1.9-15.1
ruby2.1-2.1.9-15.1
ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
libruby2_1-2_1-2.1.9-15.1
ruby2.1-2.1.9-15.1
ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Server for SAP Applications 12 SP1
libruby2_1-2_1-2.1.9-15.1
ruby2.1-2.1.9-15.1
ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Server for SAP Applications 12 SP2
libruby2_1-2_1-2.1.9-15.1
ruby2.1-2.1.9-15.1
ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Software Development Kit 12 SP1
ruby2.1-devel-2.1.9-15.1
SUSE Linux Enterprise Software Development Kit 12 SP2
ruby2.1-devel-2.1.9-15.1

Описание

Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libruby2_1-2_1-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP1:ruby2.1-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP1:ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP2:libruby2_1-2_1-2.1.9-15.1

Ссылки

Описание

verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libruby2_1-2_1-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP1:ruby2.1-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP1:ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP2:libruby2_1-2_1-2.1.9-15.1

Ссылки

Описание

RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libruby2_1-2_1-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP1:ruby2.1-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP1:ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP2:libruby2_1-2_1-2.1.9-15.1

Ссылки

Описание

The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library. NOTE: this vulnerability exists because of a CVE-2009-5147 regression.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libruby2_1-2_1-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP1:ruby2.1-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP1:ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP2:libruby2_1-2_1-2.1.9-15.1

Ссылки

Описание

An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.


Затронутые продукты
SUSE Linux Enterprise Desktop 12 SP1:libruby2_1-2_1-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP1:ruby2.1-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP1:ruby2.1-stdlib-2.1.9-15.1
SUSE Linux Enterprise Desktop 12 SP2:libruby2_1-2_1-2.1.9-15.1

Ссылки
Уязвимость SUSE-SU-2017:1067-1