SUSE Security Update: Security update for rubygem-actionpack
______________________________________________________________________________

Announcement ID:    SUSE-SU-2012:1015-1
Rating:             important
References:         #765097 #766791 
Cross-References:   CVE-2012-2660 CVE-2012-2694
Affected Products:
                    WebYaST [Appliance - Tools]
                    WebYaST 1.2
                    SUSE Studio Standard Edition 1.2
                    SUSE Studio Onsite 1.2
                    SUSE Studio Extension for System z 1.2
                    SUSE Linux Enterprise Software Development Kit 11 SP1
______________________________________________________________________________

   An update that fixes two vulnerabilities is now available.
   It includes one version update.

Description:


   This update to rubygem-actionpack fixes two unsafe query
   generations with  "IS NULL" in the WHERE clause.
   (CVE-2012-2660
    ,  CVE-2012-2694
     )

Indications:

   Everyone using rubygem-actionpack should update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - WebYaST [Appliance - Tools]:

      zypper in -t patch slewystsp1-rubygem-actionpack-2_3-6619

   - WebYaST 1.2:

      zypper in -t patch slewyst12-rubygem-actionpack-2_3-6665

   - SUSE Studio Standard Edition 1.2:

      zypper in -t patch sleslms12-rubygem-actionpack-2_3-6665

   - SUSE Studio Onsite 1.2:

      zypper in -t patch slestso12-rubygem-actionpack-2_3-6665

   - SUSE Studio Extension for System z 1.2:

      zypper in -t patch slestso12-rubygem-actionpack-2_3-6665

   - SUSE Linux Enterprise Software Development Kit 11 SP1:

      zypper in -t patch sdksp1-rubygem-actionpack-2_3-6619

   To bring your system up-to-date, use "zypper patch".


Package List:

   - WebYaST [Appliance - Tools] (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]:

      rubygem-actionpack-2_3-2.3.14-0.7.6.1

   - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]:

      rubygem-actionpack-2_3-2.3.14-0.7.6.1

   - SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.14]:

      rubygem-actionpack-2_3-2.3.14-0.7.6.1

   - SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.14]:

      rubygem-actionpack-2_3-2.3.14-0.7.6.1

   - SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.14]:

      rubygem-actionpack-2_3-2.3.14-0.7.6.1

   - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]:

      rubygem-actionpack-2_3-2.3.14-0.7.6.1


References:

   https://www.suse.com/security/cve/CVE-2012-2660.html
   https://www.suse.com/security/cve/CVE-2012-2694.html
   https://bugzilla.novell.com/765097
   https://bugzilla.novell.com/766791
   https://login.microfocus.com/nidp/app/login
   https://login.microfocus.com/nidp/app/login

SuSE: 2012:1015-1: important: rubygem-actionpack

August 21, 2012
An update that fixes two vulnerabilities is now available

Summary

This update to rubygem-actionpack fixes two unsafe query generations with "IS NULL" in the WHERE clause. (CVE-2012-2660 , CVE-2012-2694 ) Indications: Everyone using rubygem-actionpack should update. Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST [Appliance - Tools]: zypper in -t patch slewystsp1-rubygem-actionpack-2_3-6619 - WebYaST 1.2: zypper in -t patch slewyst12-rubygem-actionpack-2_3-6665 - SUSE Studio Standard Edition 1.2: zypper in -t patch sleslms12-rubygem-actionpack-2_3-6665 - SUSE Studio Onsite 1.2: zypper in -t patch slestso12-rubygem-actionpack-2_3-6665 - SUSE Studio Extension for System z 1.2: zypper in -t patch slestso12-rubygem-actionpack-2_3-6665 - SUSE Linux Enterprise Software Development Kit 11 SP1: zypper in -t patch sdksp1-rubygem-actionpack-2_3-6619 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST [Appliance - Tools] (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]: rubygem-actionpack-2_3-2.3.14-0.7.6.1 - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]: rubygem-actionpack-2_3-2.3.14-0.7.6.1 - SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.14]: rubygem-actionpack-2_3-2.3.14-0.7.6.1 - SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.14]: rubygem-actionpack-2_3-2.3.14-0.7.6.1 - SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.14]: rubygem-actionpack-2_3-2.3.14-0.7.6.1 - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]: rubygem-actionpack-2_3-2.3.14-0.7.6.1

References

#765097 #766791

Cross- CVE-2012-2660 CVE-2012-2694

Affected Products:

WebYaST [Appliance - Tools]

WebYaST 1.2

SUSE Studio Standard Edition 1.2

SUSE Studio Onsite 1.2

SUSE Studio Extension for System z 1.2

SUSE Linux Enterprise Software Development Kit 11 SP1

https://www.suse.com/security/cve/CVE-2012-2660.html

https://www.suse.com/security/cve/CVE-2012-2694.html

https://bugzilla.novell.com/765097

https://bugzilla.novell.com/766791

https://login.microfocus.com/nidp/app/login

https://login.microfocus.com/nidp/app/login

Severity
Announcement ID: SUSE-SU-2012:1015-1
Rating: important

Related News