Карточка уязвимости
Характеристики уязвимости
Уровень опасности
Оценка CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Производитель ПО
Наименование ПО
ruby
(any)
ruby-devel
(any)
ruby-doc-html
(any)
ruby-doc-ri
(any)
ruby-examples
(any)
ruby-test-suite
(any)
ruby-tk
(any)
Описание
Уведомление безопасности об уязвимостях SUSE Linux Enterprise Software Development Kit 11 SP1, SUSE Studio Standard Edition 1.2, WebYaST 1.2, SUSE Lifecycle Management Server 1.1 [Appliance - Tools], SUSE Studio Onsite 1.2, SUSE Studio Onsite 1.1, SUSE Linux Enterprise Server 11 SP1 for VMware, SUSE Studio Extension for System z 1.2, WebYaST [Appliance - Tools], SUSE Linux Enterprise Desktop 11 SP1, SUSE Linux Enterprise Server 11 SP1
Как исправить
Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
SUSE Linux Enterprise Software Development Kit 11 SP1:
i586, ia64, ppc64, s390x, x86_64:
ruby-doc-ri - 1.8.7.p357-0.7.1
ruby-examples - 1.8.7.p357-0.7.1
ruby-devel - 1.8.7.p357-0.7.1
ruby-test-suite - 1.8.7.p357-0.7.1
SUSE Linux Enterprise Software Development Kit 11 SP1:
i586, x86_64:
ruby-tk - 1.8.7.p357-0.7.1
ruby-doc-html - 1.8.7.p357-0.7.1
SUSE Studio Standard Edition 1.2:
x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
WebYaST 1.2:
i586, ia64, ppc64, s390x, x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
SUSE Lifecycle Management Server 1.1 [Appliance - Tools]:
x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
SUSE Studio Onsite 1.2:
x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
SUSE Studio Onsite 1.1:
x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
SUSE Linux Enterprise Server 11 SP1 for VMware:
i586, x86_64:
ruby-doc-html - 1.8.7.p357-0.7.1
ruby - 1.8.7.p357-0.7.1
ruby-tk - 1.8.7.p357-0.7.1
SUSE Studio Extension for System z 1.2:
s390x:
ruby-devel - 1.8.7.p357-0.7.1
WebYaST [Appliance - Tools]:
i586, ia64, ppc64, s390x, x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
SUSE Linux Enterprise Desktop 11 SP1:
i586, x86_64:
ruby - 1.8.7.p357-0.7.1
SUSE Linux Enterprise Server 11 SP1:
i586, ia64, ppc64, s390x, x86_64:
ruby-doc-html - 1.8.7.p357-0.7.1
ruby - 1.8.7.p357-0.7.1
ruby-tk - 1.8.7.p357-0.7.1
SUSE Linux Enterprise Software Development Kit 11 SP1:
i586, ia64, ppc64, s390x, x86_64:
ruby-doc-ri - 1.8.7.p357-0.7.1
ruby-examples - 1.8.7.p357-0.7.1
ruby-devel - 1.8.7.p357-0.7.1
ruby-test-suite - 1.8.7.p357-0.7.1
SUSE Linux Enterprise Software Development Kit 11 SP1:
i586, x86_64:
ruby-tk - 1.8.7.p357-0.7.1
ruby-doc-html - 1.8.7.p357-0.7.1
SUSE Studio Standard Edition 1.2:
x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
WebYaST 1.2:
i586, ia64, ppc64, s390x, x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
SUSE Lifecycle Management Server 1.1 [Appliance - Tools]:
x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
SUSE Studio Onsite 1.2:
x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
SUSE Studio Onsite 1.1:
x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
SUSE Linux Enterprise Server 11 SP1 for VMware:
i586, x86_64:
ruby-doc-html - 1.8.7.p357-0.7.1
ruby - 1.8.7.p357-0.7.1
ruby-tk - 1.8.7.p357-0.7.1
SUSE Studio Extension for System z 1.2:
s390x:
ruby-devel - 1.8.7.p357-0.7.1
WebYaST [Appliance - Tools]:
i586, ia64, ppc64, s390x, x86_64:
ruby-devel - 1.8.7.p357-0.7.1
ruby-dbus - 0.4.0-0.9.4
SUSE Linux Enterprise Desktop 11 SP1:
i586, x86_64:
ruby - 1.8.7.p357-0.7.1
SUSE Linux Enterprise Server 11 SP1:
i586, ia64, ppc64, s390x, x86_64:
ruby-doc-html - 1.8.7.p357-0.7.1
ruby - 1.8.7.p357-0.7.1
ruby-tk - 1.8.7.p357-0.7.1
Ссылки
http://lists.suse.com/pipermail/sle-security-updates/2012-February/000017.html
https://bugzilla.novell.com/704409
https://bugzilla.novell.com/739122
https://bugzilla.novell.com/740796
http://download.novell.com/patch/finder/?keywords=04214679f41728fe49ac9a6f9d32da7f
http://download.novell.com/patch/finder/?keywords=e0d0ef7ec3aa01a87e6c002c3f147d73
Источник: CVE
Наименование: CVE-2011-2686
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2686
Источник: CVE
Наименование: CVE-2011-2705
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2705
Источник: CVE
Наименование: CVE-2011-3009
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3009
Источник: CVE
Наименование: CVE-2011-4815
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4815
https://bugzilla.novell.com/704409
https://bugzilla.novell.com/739122
https://bugzilla.novell.com/740796
http://download.novell.com/patch/finder/?keywords=04214679f41728fe49ac9a6f9d32da7f
http://download.novell.com/patch/finder/?keywords=e0d0ef7ec3aa01a87e6c002c3f147d73
Источник: CVE
Наименование: CVE-2011-2686
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2686
Источник: CVE
Наименование: CVE-2011-2705
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2705
Источник: CVE
Наименование: CVE-2011-3009
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3009
Источник: CVE
Наименование: CVE-2011-4815
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4815