Fedora 26: ruby Security Update 2017-6e6f4f95e6
Summary
Ruby is the interpreted scripting language for quick and easy
object-oriented programming. It has many features to process text
files and to do system management tasks (as in Perl). It is simple,
straight-forward, and extensible.
Update to Ruby 2.4.2.
[ 1 ] Bug #1491866 - CVE-2017-14033 ruby: Buffer underrun in OpenSSL ASN1 decode
https://bugzilla.redhat.com/show_bug.cgi?id=1491866
[ 2 ] Bug #1492012 - CVE-2017-10784 ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick
https://bugzilla.redhat.com/show_bug.cgi?id=1492012
[ 3 ] Bug #1492015 - CVE-2017-0898 ruby: Buffer underrun vulnerability in Kernel.sprintf
https://bugzilla.redhat.com/show_bug.cgi?id=1492015
su -c 'dnf upgrade ruby' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
FEDORA-2017-6e6f4f95e6 2017-12-26 15:02:57.896366 Product : Fedora 26 Version : 2.4.2 Release : 84.fc26 URL : https://www.ruby-lang.org/ Summary : An interpreter of object-oriented scripting language Description : Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible. Update to Ruby 2.4.2. [ 1 ] Bug #1491866 - CVE-2017-14033 ruby: Buffer underrun in OpenSSL ASN1 decode https://bugzilla.redhat.com/show_bug.cgi?id=1491866 [ 2 ] Bug #1492012 - CVE-2017-10784 ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick https://bugzilla.redhat.com/show_bug.cgi?id=1492012 [ 3 ] Bug #1492015 - CVE-2017-0898 ruby: Buffer underrun vulnerability in Kernel.sprintf https://bugzilla.redhat.com/show_bug.cgi?id=1492015 su -c 'dnf upgrade ruby' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Change Log
References