Description: | Summary: The remote host is missing an update for the 'ruby' package(s) announced via the SUSE-SU-2012:0147-1 advisory.
Vulnerability Insight: This update of ruby provides 1.8.7p357, which contains many stability fixes and bug fixes while maintaining full compatibility with the previous version. A detailailed list of changes is available from [link moved to references] g og> .
The most important fixes are:
* Hash functions are now using a randomized seed to avoid algorithmic complexity attacks. If available, OpenSSL::Random.seed at the SecureRandom.random_bytes is used to achieve this. (CVE-2011-4815 > ) * mkconfig.rb: fix for continued lines. * Fix Infinity to be greater than any bignum number. * Initialize store->ex_data.sk. * Several IPv6 related fixes. * Fixes for zlib. * Reinitialize PRNG when forking children (CVE-2011-2686 > , CVE-2011-3009 > ) * Fixes to securerandom. (CVE-2011-2705 > ) * Fix uri route_to * Fix race condition with variables and autoload.
Affected Software/OS: 'ruby' package(s) on SUSE Lifecycle Management Server 1.1, SUSE Linux Enterprise Desktop 11-SP1, SUSE Linux Enterprise Server 11-SP1, SUSE Linux Enterprise Software Development Kit 11-SP1, SUSE Studio Extension for System z 1.2, SUSE Studio Onsite 1.1, SUSE Studio Onsite 1.2, SUSE Studio Standard Edition 1.2.
Solution: Please install the updated package(s).
CVSS Score: 7.8
CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C
|