openSUSE: 2013:0280-1: important: ruby on rails
Description
This update updates the RubyOnRails 2.3 stack to 2.3.16. Security and bugfixes were done, foremost: CVE-2013-0333: A JSON sql/code injection problem was fixed. CVE-2012-5664: A SQL Injection Vulnerability in Active Record was fixed. CVE-2012-2695: A SQL injection via nested hashes in conditions was fixed. CVE-2013-0155: Unsafe Query Generation Risk in Ruby on Rails was fixed. CVE-2013-0156: Multiple vulnerabilities in parameter parsing in Action Pack were fixed. CVE-2012-5664: options hashes should only be extracted if there are extra parameters CVE-2012-2695: Fix SQL injection via nested hashes in conditions CVE-2013-0156: Hash.from_xml raises when it encounters type="symbol" or type="yaml". Use Hash.from_trusted_xml to parse this XM
Patch
Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch 2013-21 To bring your system up-to-date, use "zypper patch".
Package List
- openSUSE 11.4 (i586 x86_64): rubygem-actionmailer-2_3-2.3.16-0.16.1 rubygem-actionmailer-2_3-doc-2.3.16-0.16.1 rubygem-actionmailer-2_3-testsuite-2.3.16-0.16.1 rubygem-actionpack-2_3-2.3.16-0.23.1 rubygem-actionpack-2_3-doc-2.3.16-0.23.1 rubygem-actionpack-2_3-testsuite-2.3.16-0.23.1 rubygem-activerecord-2_3-2.3.16-0.19.1 rubygem-activerecord-2_3-doc-2.3.16-0.19.1 rubygem-activerecord-2_3-testsuite-2.3.16-0.19.1 rubygem-activeresource-2_3-2.3.16-0.16.1 rubygem-activeresource-2_3-doc-2.3.16-0.16.1 rubygem-activeresource-2_3-testsuite-2.3.16-0.16.1 rubygem-activesupport-2_3-2.3.16-0.16.1 rubygem-activesupport-2_3-doc-2.3.16-0.16.1 rubygem-rack-1.1.5-0.8.1 rubygem-rails-2_3-2.3.16-0.12.1 rubygem-rails-2_3-doc-2.3.16-0.12.1 - openSUSE 11.4 (noarch): rubygem-actionmailer-2.3.16-0.6.1 rubygem-actionpack-2.3.16-0.6.1 rubygem-activerecord-2.3.16-0.6.1 rubygem-activeresource-2.3.16-0.6.1 rubygem-activesupport-2.3.16-0.6.1 rubygem-rails-2.3.16-0.6.1
References
https://www.suse.com/security/cve/CVE-2012-2695.html https://www.suse.com/security/cve/CVE-2012-5664.html https://www.suse.com/security/cve/CVE-2013-0155.html https://www.suse.com/security/cve/CVE-2013-0156.html https://www.suse.com/security/cve/CVE-2013-0333.html https://bugzilla.novell.com/766792 https://bugzilla.novell.com/775649 https://bugzilla.novell.com/775653 https://bugzilla.novell.com/796712 https://bugzilla.novell.com/797449 https://bugzilla.novell.com/797452 https://bugzilla.novell.com/798452 https://bugzilla.novell.com/798458 https://bugzilla.novell.com/800320