<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ruby2.1</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1128-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-04-28T10:55:03Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-04-28T10:55:03Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-04-28T10:55:03Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ruby2.1</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This ruby2.1 update to version 2.1.9 fixes the following issues:

Security issues fixed:
- CVE-2016-2339: heap overflow vulnerability in the Fiddle::Function.new'initialize' (bsc#1018808)
- CVE-2015-7551: Unsafe tainted string usage in Fiddle and DL (bsc#959495)
- CVE-2015-3900: hostname validation does not work when fetching gems or making API requests (bsc#936032)
- CVE-2015-1855: Ruby'a OpenSSL extension suffers a vulnerability through overly permissive matching of
  hostnames (bsc#926974)
- CVE-2014-4975: off-by-one stack-based buffer overflow in the encodes() function (bsc#887877)

Bugfixes:
- SUSEconnect doesn't handle domain wildcards in no_proxy environment variable properly (bsc#1014863)
- Segmentation fault after pack &amp; ioctl &amp; unpack (bsc#909695)
- Ruby:HTTP Header injection in 'net/http' (bsc#986630)

ChangeLog:
- http://svn.ruby-lang.org/repos/ruby/tags/v2_1_9/ChangeLog

This update was imported from the SUSE:SLE-12:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:1128-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 42.2">
      <Branch Type="Product Name" Name="openSUSE Leap 42.2">
        <FullProductName ProductID="openSUSE Leap 42.2">openSUSE Leap 42.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libruby2_1-2_1-2.1.9-8.3.2">
      <FullProductName ProductID="libruby2_1-2_1-2.1.9-8.3.2">libruby2_1-2_1-2.1.9-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-2.1.9-8.3.2">
      <FullProductName ProductID="ruby2.1-2.1.9-8.3.2">ruby2.1-2.1.9-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-devel-2.1.9-8.3.2">
      <FullProductName ProductID="ruby2.1-devel-2.1.9-8.3.2">ruby2.1-devel-2.1.9-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-devel-extra-2.1.9-8.3.2">
      <FullProductName ProductID="ruby2.1-devel-extra-2.1.9-8.3.2">ruby2.1-devel-extra-2.1.9-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-doc-2.1.9-8.3.2">
      <FullProductName ProductID="ruby2.1-doc-2.1.9-8.3.2">ruby2.1-doc-2.1.9-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-doc-ri-2.1.9-8.3.2">
      <FullProductName ProductID="ruby2.1-doc-ri-2.1.9-8.3.2">ruby2.1-doc-ri-2.1.9-8.3.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-stdlib-2.1.9-8.3.2">
      <FullProductName ProductID="ruby2.1-stdlib-2.1.9-8.3.2">ruby2.1-stdlib-2.1.9-8.3.2</FullProductName>
    </Branch>
    <Relationship ProductReference="libruby2_1-2_1-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libruby2_1-2_1-2.1.9-8.3.2">libruby2_1-2_1-2.1.9-8.3.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ruby2.1-2.1.9-8.3.2">ruby2.1-2.1.9-8.3.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-devel-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ruby2.1-devel-2.1.9-8.3.2">ruby2.1-devel-2.1.9-8.3.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-devel-extra-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ruby2.1-devel-extra-2.1.9-8.3.2">ruby2.1-devel-extra-2.1.9-8.3.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-doc-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ruby2.1-doc-2.1.9-8.3.2">ruby2.1-doc-2.1.9-8.3.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-doc-ri-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ruby2.1-doc-ri-2.1.9-8.3.2">ruby2.1-doc-ri-2.1.9-8.3.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-stdlib-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:ruby2.1-stdlib-2.1.9-8.3.2">ruby2.1-stdlib-2.1.9-8.3.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libruby2_1-2_1-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:libruby2_1-2_1-2.1.9-8.3.2">libruby2_1-2_1-2.1.9-8.3.2 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ruby2.1-2.1.9-8.3.2">ruby2.1-2.1.9-8.3.2 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-devel-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ruby2.1-devel-2.1.9-8.3.2">ruby2.1-devel-2.1.9-8.3.2 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-devel-extra-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ruby2.1-devel-extra-2.1.9-8.3.2">ruby2.1-devel-extra-2.1.9-8.3.2 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-doc-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ruby2.1-doc-2.1.9-8.3.2">ruby2.1-doc-2.1.9-8.3.2 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-doc-ri-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ruby2.1-doc-ri-2.1.9-8.3.2">ruby2.1-doc-ri-2.1.9-8.3.2 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-stdlib-2.1.9-8.3.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.2">
      <FullProductName ProductID="openSUSE Leap 42.2:ruby2.1-stdlib-2.1.9-8.3.2">ruby2.1-stdlib-2.1.9-8.3.2 as a component of openSUSE Leap 42.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2014-4975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libruby2_1-2_1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-devel-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-devel-extra-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-doc-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-doc-ri-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-stdlib-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:libruby2_1-2_1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-devel-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-devel-extra-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-doc-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-doc-ri-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-stdlib-2.1.9-8.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4975.html</URL>
        <Description>CVE-2014-4975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887877</URL>
        <Description>SUSE Bug 887877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.</Note>
    </Notes>
    <CVE>CVE-2015-1855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libruby2_1-2_1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-devel-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-devel-extra-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-doc-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-doc-ri-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-stdlib-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:libruby2_1-2_1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-devel-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-devel-extra-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-doc-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-doc-ri-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-stdlib-2.1.9-8.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1855.html</URL>
        <Description>CVE-2015-1855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/926974</URL>
        <Description>SUSE Bug 926974</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before 2.4.7 does not validate the hostname when fetching gems or making API requests, which allows remote attackers to redirect requests to arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack attack."</Note>
    </Notes>
    <CVE>CVE-2015-3900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libruby2_1-2_1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-devel-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-devel-extra-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-doc-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-doc-ri-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-stdlib-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:libruby2_1-2_1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-devel-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-devel-extra-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-doc-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-doc-ri-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-stdlib-2.1.9-8.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3900.html</URL>
        <Description>CVE-2015-3900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936032</URL>
        <Description>SUSE Bug 936032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted string, related to the DL module and the libffi library.  NOTE: this vulnerability exists because of a CVE-2009-5147 regression.</Note>
    </Notes>
    <CVE>CVE-2015-7551</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libruby2_1-2_1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-devel-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-devel-extra-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-doc-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-doc-ri-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-stdlib-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:libruby2_1-2_1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-devel-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-devel-extra-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-doc-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-doc-ri-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-stdlib-2.1.9-8.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7551.html</URL>
        <Description>CVE-2015-7551</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939860</URL>
        <Description>SUSE Bug 939860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959495</URL>
        <Description>SUSE Bug 959495</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length. Specially constructed object passed as element of args array can increase this array size after mentioned allocation and cause heap overflow.</Note>
    </Notes>
    <CVE>CVE-2016-2339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:libruby2_1-2_1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-devel-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-devel-extra-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-doc-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-doc-ri-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.1:ruby2.1-stdlib-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:libruby2_1-2_1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-devel-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-devel-extra-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-doc-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-doc-ri-2.1.9-8.3.2</ProductID>
        <ProductID>openSUSE Leap 42.2:ruby2.1-stdlib-2.1.9-8.3.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2017-04/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2339.html</URL>
        <Description>CVE-2016-2339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1018808</URL>
        <Description>SUSE Bug 1018808</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
