Risks
Advisories
Browse
or
or
SUSE Security Update - Ruby on Rails (SUSE-SU-2013:0606-1)
SUSE Security Update: Security update for Ruby on Rails
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0606-1
Rating:             important
References:         #796712 #797449 #797452 #800320 #803336 #803339

Cross-References:   CVE-2012-5664 CVE-2013-0155 CVE-2013-0156
                    CVE-2013-0276 CVE-2013-0333
Affected Products:
                    WebYaST 1.2
                    SUSE Studio Standard Edition 1.2
                    SUSE Studio Onsite 1.2
                    SUSE Studio Extension for System z 1.2
______________________________________________________________________________

   An update that solves 5 vulnerabilities and has one errata
   is now available. It includes one version update.

Description:


   The Ruby on Rails stack has been updated to 2.3.17 to fix
   various security  issues and bugs.

   The rails gems were updated to fix:

   * Unsafe Query Generation Risk in Ruby on Rails
   (CVE-2013-0155)
   * Multiple vulnerabilities in parameter parsing in
   Action Pack (CVE-2013-0156)
   * SQL Injection Vulnerability in Active Record
   (CVE-2012-5664)
   * rails: Vulnerability in JSON Parser in Ruby on Rails
   3.0 and 2.3 (CVE-2013-0333)
   * activerecord: Circumvention of attr_protected
   (CVE-2013-0276)
   * activerecord: Serialized Attributes YAML
   Vulnerability with Rails 2.3 and 3.0 (CVE-2013-0277)

   Security Issue references:

   * CVE-2012-5664
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5664
   >
   * CVE-2013-0155
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0155
   >
   * CVE-2013-0156
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0156
   >
   * CVE-2013-0333
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0333
   >
   * CVE-2013-0276
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0276
   >
   * CVE-2013-0276
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0276
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - WebYaST 1.2:

      zypper in -t patch slewyst12-rubygem-actionmailer-2_3-7364

   - SUSE Studio Standard Edition 1.2:

      zypper in -t patch sleslms12-rubygem-actionmailer-2_3-7364

   - SUSE Studio Onsite 1.2:

      zypper in -t patch slestso12-rubygem-actionmailer-2_3-7364

   - SUSE Studio Extension for System z 1.2:

      zypper in -t patch slestso12-rubygem-actionmailer-2_3-7364

   To bring your system up-to-date, use "zypper patch".


Package List:

   - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.17]:

      rubygem-actionmailer-2_3-2.3.17-0.6.1
      rubygem-actionpack-2_3-2.3.17-0.6.1
      rubygem-activerecord-2_3-2.3.17-0.6.1
      rubygem-activeresource-2_3-2.3.17-0.6.1
      rubygem-activesupport-2_3-2.3.17-0.6.1
      rubygem-rails-2_3-2.3.17-0.6.2

   - SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.17]:

      rubygem-actionmailer-2_3-2.3.17-0.6.1
      rubygem-actionpack-2_3-2.3.17-0.6.1
      rubygem-activerecord-2_3-2.3.17-0.6.1
      rubygem-activeresource-2_3-2.3.17-0.6.1
      rubygem-activesupport-2_3-2.3.17-0.6.1
      rubygem-rails-2_3-2.3.17-0.6.2

   - SUSE Studio Standard Edition 1.2 (noarch) [New Version: 2.3.17]:

      rubygem-rails-2.3.17-0.4.6.1

   - SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.17]:

      rubygem-actionmailer-2_3-2.3.17-0.6.1
      rubygem-actionpack-2_3-2.3.17-0.6.1
      rubygem-activerecord-2_3-2.3.17-0.6.1
      rubygem-activeresource-2_3-2.3.17-0.6.1
      rubygem-activesupport-2_3-2.3.17-0.6.1
      rubygem-rails-2_3-2.3.17-0.6.2

   - SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.17]:

      rubygem-actionmailer-2_3-2.3.17-0.6.1
      rubygem-actionpack-2_3-2.3.17-0.6.1
      rubygem-activerecord-2_3-2.3.17-0.6.1
      rubygem-activeresource-2_3-2.3.17-0.6.1
      rubygem-activesupport-2_3-2.3.17-0.6.1
      rubygem-rails-2_3-2.3.17-0.6.2


References:

   http://support.novell.com/security/cve/CVE-2012-5664.html
   http://support.novell.com/security/cve/CVE-2013-0155.html
   http://support.novell.com/security/cve/CVE-2013-0156.html
   http://support.novell.com/security/cve/CVE-2013-0276.html
   http://support.novell.com/security/cve/CVE-2013-0333.html
   https://bugzilla.novell.com/796712
   https://bugzilla.novell.com/797449
   https://bugzilla.novell.com/797452
   https://bugzilla.novell.com/800320
   https://bugzilla.novell.com/803336
   https://bugzilla.novell.com/803339
   http://download.novell.com/patch/finder/?keywords=dfb687aafb848ceb562a7f371bb1ccf7




Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //