openSUSE Security Update : ruby19 (openSUSE-SU-2013:0376-1)

medium Nessus Plugin ID 74909

Synopsis

The remote openSUSE host is missing a security update.

Description

ruby19 was updated to fix various bugs and security issues: Update to 1.9.3 p385 (bnc#802406)

- XSS exploit of RDoc documentation generated by rdoc (CVE-2013-0256)

- for other changes see /usr/share/doc/packages/ruby19/Changelog

Update to 1.9.3 p327 (bnc#789983)

- CVE-2012-5371 and plenty of other fixes

Update to 1.9.3 p286 (bnc#783511, bnc#791199)

- This release includes some security fixes, and many other bug fixes. $SAFE escaping vulnerability about Exception#to_s / NameError#to_s (CVE-2012-4464, CVE-2012-4466)

- Unintentional file creation caused by inserting an illegal NUL character many other bug fixes.
(CVE-2012-4522) Also following bugfixes and packaging fixes were done :

- make sure the rdoc output is more stable for build-compare (new patch ruby-sort-rdoc-output.patch)

- readd the private header *atomic.h

- remove build depencency on ca certificates - only causing cycles

- one more header needed for rubygem-ruby-debug-base19

- install vm_core.h and its dependencies as ruby-devel-extra

- move the provides to the ruby package instead

- add provides for the internal gems

- restore the old ruby macros and the gem wrapper script

- gem_install_wrapper no longer necessary

Solution

Update the affected ruby19 packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=791199

https://bugzilla.novell.com/show_bug.cgi?id=802406

https://lists.opensuse.org/opensuse-updates/2013-03/msg00002.html

https://bugzilla.novell.com/show_bug.cgi?id=783511

https://bugzilla.novell.com/show_bug.cgi?id=789983

Plugin Details

Severity: Medium

ID: 74909

File Name: openSUSE-2013-167.nasl

Version: 1.4

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:ruby19-debuginfo, cpe:/o:novell:opensuse:12.2, p-cpe:/a:novell:opensuse:ruby19-devel, p-cpe:/a:novell:opensuse:ruby19-debugsource, p-cpe:/a:novell:opensuse:ruby19-devel-extra, p-cpe:/a:novell:opensuse:ruby19-doc-ri, p-cpe:/a:novell:opensuse:ruby19, p-cpe:/a:novell:opensuse:ruby19-tk, p-cpe:/a:novell:opensuse:ruby19-tk-debuginfo

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 2/21/2013

Reference Information

CVE: CVE-2012-4464, CVE-2012-4466, CVE-2012-4522, CVE-2012-5371, CVE-2013-0256

BID: 55757, 56115, 56484, 57785