SUSE alert SUSE-SU-2018:3996-1 (rubygem-activejob-5_1)
| From: | <sle-security-updates@lists.suse.com> | |
| To: | <sle-security-updates@lists.suse.com> | |
| Subject: | SUSE-SU-2018:3996-1: Security update for rubygem-activejob-5_1 | |
| Date: | Thu, 6 Dec 2018 15:10:30 +0100 | |
| Message-ID: | <20181206141031.004EBFCB4@maintenance.suse.de> |
SUSE Security Update: Security update for rubygem-activejob-5_1 ______________________________________________________________________________ Announcement ID: SUSE-SU-2018:3996-1 Rating: low References: #1117632 Cross-References: CVE-2018-16476 Affected Products: SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 SUSE Linux Enterprise High Availability 15 ______________________________________________________________________________ An update that fixes one vulnerability is now available. Description: This update for rubygem-activejob-5_1 fixes the following issues: Security issue fixed: - CVE-2018-16476: Fixed broken access control vulnerability (bsc#1117632). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15: zypper in -t patch SUSE-SLE-Module-Development-Tools-OBS-15-2018-2857=1 - SUSE Linux Enterprise High Availability 15: zypper in -t patch SUSE-SLE-Product-HA-15-2018-2857=1 Package List: - SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (aarch64 ppc64le s390x x86_64): ruby2.5-rubygem-activejob-doc-5_1-5.1.4-3.3.1 - SUSE Linux Enterprise High Availability 15 (aarch64 ppc64le s390x x86_64): ruby2.5-rubygem-activejob-5_1-5.1.4-3.3.1 References: https://www.suse.com/security/cve/CVE-2018-16476.html https://bugzilla.suse.com/1117632 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates
