Login


 
Newsletter
Werbung
Sicherheit: Mehrere Probleme in Ruby on Rails
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Ruby on Rails
ID: SUSE-SU-2013:0606-1
Distribution: SUSE
Plattformen: SUSE Studio Onsite 1.2, SUSE Studio Standard Edition 1.2, SUSE WebYaST 1.2, SUSE Studio Extension for System z 1.2
Datum: Do, 4. April 2013, 07:19
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5664
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0155
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0156
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0276
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0333

Originalnachricht

   SUSE Security Update: Security update for Ruby on Rails
______________________________________________________________________________

Announcement ID: SUSE-SU-2013:0606-1
Rating: important
References: #796712 #797449 #797452 #800320 #803336 #803339

Cross-References: CVE-2012-5664 CVE-2013-0155 CVE-2013-0156
CVE-2013-0276 CVE-2013-0333
Affected Products:
WebYaST 1.2
SUSE Studio Standard Edition 1.2
SUSE Studio Onsite 1.2
SUSE Studio Extension for System z 1.2
______________________________________________________________________________

An update that solves 5 vulnerabilities and has one errata
is now available. It includes one version update.

Description:


The Ruby on Rails stack has been updated to 2.3.17 to fix
various security issues and bugs.

The rails gems were updated to fix:

* Unsafe Query Generation Risk in Ruby on Rails
(CVE-2013-0155)
* Multiple vulnerabilities in parameter parsing in
Action Pack (CVE-2013-0156)
* SQL Injection Vulnerability in Active Record
(CVE-2012-5664)
* rails: Vulnerability in JSON Parser in Ruby on Rails
3.0 and 2.3 (CVE-2013-0333)
* activerecord: Circumvention of attr_protected
(CVE-2013-0276)
* activerecord: Serialized Attributes YAML
Vulnerability with Rails 2.3 and 3.0 (CVE-2013-0277)

Security Issue references:

* CVE-2012-5664
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5664
>
* CVE-2013-0155
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0155
>
* CVE-2013-0156
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0156
>
* CVE-2013-0333
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0333
>
* CVE-2013-0276
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0276
>
* CVE-2013-0276
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0276
>


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- WebYaST 1.2:

zypper in -t patch slewyst12-rubygem-actionmailer-2_3-7364

- SUSE Studio Standard Edition 1.2:

zypper in -t patch sleslms12-rubygem-actionmailer-2_3-7364

- SUSE Studio Onsite 1.2:

zypper in -t patch slestso12-rubygem-actionmailer-2_3-7364

- SUSE Studio Extension for System z 1.2:

zypper in -t patch slestso12-rubygem-actionmailer-2_3-7364

To bring your system up-to-date, use "zypper patch".


Package List:

- WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.17]:

rubygem-actionmailer-2_3-2.3.17-0.6.1
rubygem-actionpack-2_3-2.3.17-0.6.1
rubygem-activerecord-2_3-2.3.17-0.6.1
rubygem-activeresource-2_3-2.3.17-0.6.1
rubygem-activesupport-2_3-2.3.17-0.6.1
rubygem-rails-2_3-2.3.17-0.6.2

- SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.17]:

rubygem-actionmailer-2_3-2.3.17-0.6.1
rubygem-actionpack-2_3-2.3.17-0.6.1
rubygem-activerecord-2_3-2.3.17-0.6.1
rubygem-activeresource-2_3-2.3.17-0.6.1
rubygem-activesupport-2_3-2.3.17-0.6.1
rubygem-rails-2_3-2.3.17-0.6.2

- SUSE Studio Standard Edition 1.2 (noarch) [New Version: 2.3.17]:

rubygem-rails-2.3.17-0.4.6.1

- SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.17]:

rubygem-actionmailer-2_3-2.3.17-0.6.1
rubygem-actionpack-2_3-2.3.17-0.6.1
rubygem-activerecord-2_3-2.3.17-0.6.1
rubygem-activeresource-2_3-2.3.17-0.6.1
rubygem-activesupport-2_3-2.3.17-0.6.1
rubygem-rails-2_3-2.3.17-0.6.2

- SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.17]:

rubygem-actionmailer-2_3-2.3.17-0.6.1
rubygem-actionpack-2_3-2.3.17-0.6.1
rubygem-activerecord-2_3-2.3.17-0.6.1
rubygem-activeresource-2_3-2.3.17-0.6.1
rubygem-activesupport-2_3-2.3.17-0.6.1
rubygem-rails-2_3-2.3.17-0.6.2


References:

http://support.novell.com/security/cve/CVE-2012-5664.html
http://support.novell.com/security/cve/CVE-2013-0155.html
http://support.novell.com/security/cve/CVE-2013-0156.html
http://support.novell.com/security/cve/CVE-2013-0276.html
http://support.novell.com/security/cve/CVE-2013-0333.html
https://bugzilla.novell.com/796712
https://bugzilla.novell.com/797449
https://bugzilla.novell.com/797452
https://bugzilla.novell.com/800320
https://bugzilla.novell.com/803336
https://bugzilla.novell.com/803339
?keywords=dfb687aafb848ceb562a7f371bb1ccf7

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Pro-Linux @Twitter
Neue Nachrichten
Werbung