Revision Date: | 2021-12-01 | Version: | 1 |
Title: | Security update for ruby2.5 (Important) |
Description: |
This update for ruby2.5 fixes the following issues:
- CVE-2021-31799: Fixed Command injection vulnerability in RDoc (bsc#1190375). - CVE-2021-31810: Fixed trusting FTP PASV responses vulnerability in Net:FTP (bsc#1188161). - CVE-2021-32066: Fixed StartTLS stripping vulnerability in Net:IMAP (bsc#1188160).
|
Family: | unix | Class: | patch |
Status: | | Reference(s): | 1170446 1173594 1188160 1188161 1190375 CVE-2012-4504 CVE-2020-8695 CVE-2020-8698 CVE-2021-31799 CVE-2021-31810 CVE-2021-32066 SUSE-SU-2020:3271-1 SUSE-SU-2021:3838-1
|
Platform(s): | SUSE Linux Enterprise Module for Basesystem 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SUSE Linux Enterprise Workstation Extension 15 SP2
| Product(s): | |
Definition Synopsis |
SUSE Linux Enterprise Module for Basesystem 15 SP2 is installed AND ucode-intel-20201027-2.7 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Server for SAP Applications 15 is installed
AND Package Information
libruby2_5-2_5-2.5.9-4.20.1 is installed
OR ruby2.5-2.5.9-4.20.1 is installed
OR ruby2.5-devel-2.5.9-4.20.1 is installed
OR ruby2.5-devel-extra-2.5.9-4.20.1 is installed
OR ruby2.5-stdlib-2.5.9-4.20.1 is installed
|
Definition Synopsis |
SUSE Linux Enterprise Workstation Extension 15 SP2 is installed
AND Package Information
libproxy1-config-gnome3-0.4.15-2 is installed
OR libproxy1-networkmanager-0.4.15-2 is installed
|