Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in ruby2.5
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in ruby2.5
ID: openSUSE-SU-2020:0395-1
Distribution: SUSE
Plattformen: openSUSE Leap 15.1
Datum: So, 29. März 2020, 10:12
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15845
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16254
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6708
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16255
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16201
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251
Applikationen: Ruby

Originalnachricht

   openSUSE Security Update: Recommended update for ruby2.5
______________________________________________________________________________

Announcement ID: openSUSE-SU-2020:0395-1
Rating: important
References: #1140844 #1152990 #1152992 #1152994 #1152995
#1162396 #1164804
Cross-References: CVE-2012-6708 CVE-2015-9251 CVE-2019-15845
CVE-2019-16201 CVE-2019-16254 CVE-2019-16255
CVE-2020-8130
Affected Products:
openSUSE Leap 15.1
______________________________________________________________________________

An update that fixes 7 vulnerabilities is now available.

Description:

This update for ruby2.5 toversion 2.5.7 fixes the following issues:

ruby 2.5 was updated to version 2.5.7

- CVE-2020-8130: Fixed a command injection in intree copy of rake
(bsc#1164804).
- CVE-2019-16255: Fixed a code injection vulnerability of Shell#[] and
Shell#test (bsc#1152990).
- CVE-2019-16254: Fixed am HTTP response splitting in WEBrick
(bsc#1152992).
- CVE-2019-15845: Fixed a null injection vulnerability of File.fnmatch and
File.fnmatch? (bsc#1152994).
- CVE-2019-16201: Fixed a regular expression denial of service of WEBrick
Digest access authentication (bsc#1152995).
- CVE-2012-6708: Fixed an XSS in JQuery
- CVE-2015-9251: Fixed an XSS in JQuery
- Fixed unit tests (bsc#1140844)
- Removed some unneeded test files (bsc#1162396).

This update was imported from the SUSE:SLE-15:Update update project.


Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended
installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.1:

zypper in -t patch openSUSE-2020-395=1



Package List:

- openSUSE Leap 15.1 (noarch):

ruby2.5-doc-ri-2.5.7-lp151.4.6.1

- openSUSE Leap 15.1 (x86_64):

libruby2_5-2_5-2.5.7-lp151.4.6.1
libruby2_5-2_5-debuginfo-2.5.7-lp151.4.6.1
ruby2.5-2.5.7-lp151.4.6.1
ruby2.5-debuginfo-2.5.7-lp151.4.6.1
ruby2.5-debugsource-2.5.7-lp151.4.6.1
ruby2.5-devel-2.5.7-lp151.4.6.1
ruby2.5-devel-extra-2.5.7-lp151.4.6.1
ruby2.5-doc-2.5.7-lp151.4.6.1
ruby2.5-stdlib-2.5.7-lp151.4.6.1
ruby2.5-stdlib-debuginfo-2.5.7-lp151.4.6.1


References:

https://www.suse.com/security/cve/CVE-2012-6708.html
https://www.suse.com/security/cve/CVE-2015-9251.html
https://www.suse.com/security/cve/CVE-2019-15845.html
https://www.suse.com/security/cve/CVE-2019-16201.html
https://www.suse.com/security/cve/CVE-2019-16254.html
https://www.suse.com/security/cve/CVE-2019-16255.html
https://www.suse.com/security/cve/CVE-2020-8130.html
https://bugzilla.suse.com/1140844
https://bugzilla.suse.com/1152990
https://bugzilla.suse.com/1152992
https://bugzilla.suse.com/1152994
https://bugzilla.suse.com/1152995
https://bugzilla.suse.com/1162396
https://bugzilla.suse.com/1164804

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung