Risks
Advisories
Browse
or
or
SUSE Security Update - rubygem-extlib (SUSE-SU-2013:0612-1)
SUSE Security Update: Security update for rubygem-extlib
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0612-1
Rating:             important
References:         #804719
Cross-References:   CVE-2013-0269
Affected Products:
                    SUSE Cloud 1.0
______________________________________________________________________________

   An update that fixes one vulnerability is now available.

Description:


   The Extlib Ruby Gem has been updated to fix a Denial of
   Service  vulnerability in XML (CVE-2013-1802)

   Security Issue references:

   * CVE-2013-0269
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0269
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Cloud 1.0:

      zypper in -t patch sleclo10sp2-rubygem-extlib-7498

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Cloud 1.0 (x86_64):

      rubygem-extlib-0.9.15-0.9.1


References:

   http://support.novell.com/security/cve/CVE-2013-0269.html
   https://bugzilla.novell.com/804719
   http://download.novell.com/patch/finder/?keywords=e1291d45bc0b7f1bc2197ac8c930bc4b




Spotlight

Operation Pawn Storm: Varied targets and attack vectors, next-level spear-phishing tactics

Posted on 23 October 2014.  |  Targets of the spear phishing emails included staff at the Ministry of Defense in France, in the Vatican Embassy in Iraq, military officials from a number of countries, and more.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 24th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //