SUSE Security Update: Security update for Ruby on Rails
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0606-1
Rating:             important
References:         #796712 #797449 #797452 #800320 #803336 #803339 
                    
Cross-References:   CVE-2012-5664 CVE-2013-0155 CVE-2013-0156
                    CVE-2013-0276 CVE-2013-0333
Affected Products:
                    WebYaST 1.2
                    SUSE Studio Standard Edition 1.2
                    SUSE Studio Onsite 1.2
                    SUSE Studio Extension for System z 1.2
______________________________________________________________________________

   An update that solves 5 vulnerabilities and has one errata
   is now available. It includes one version update.

Description:


   The Ruby on Rails stack has been updated to 2.3.17 to fix
   various security  issues and bugs.

   The rails gems were updated to fix:

   * Unsafe Query Generation Risk in Ruby on Rails
   (CVE-2013-0155)
   * Multiple vulnerabilities in parameter parsing in
   Action Pack (CVE-2013-0156)
   * SQL Injection Vulnerability in Active Record
   (CVE-2012-5664)
   * rails: Vulnerability in JSON Parser in Ruby on Rails
   3.0 and 2.3 (CVE-2013-0333)
   * activerecord: Circumvention of attr_protected
   (CVE-2013-0276)
   * activerecord: Serialized Attributes YAML
   Vulnerability with Rails 2.3 and 3.0 (CVE-2013-0277)

   Security Issue references:

   * CVE-2012-5664
   
   * CVE-2013-0155
   
   * CVE-2013-0156
   
   * CVE-2013-0333
   
   * CVE-2013-0276
   
   * CVE-2013-0276
   


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - WebYaST 1.2:

      zypper in -t patch slewyst12-rubygem-actionmailer-2_3-7364

   - SUSE Studio Standard Edition 1.2:

      zypper in -t patch sleslms12-rubygem-actionmailer-2_3-7364

   - SUSE Studio Onsite 1.2:

      zypper in -t patch slestso12-rubygem-actionmailer-2_3-7364

   - SUSE Studio Extension for System z 1.2:

      zypper in -t patch slestso12-rubygem-actionmailer-2_3-7364

   To bring your system up-to-date, use "zypper patch".


Package List:

   - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.17]:

      rubygem-actionmailer-2_3-2.3.17-0.6.1
      rubygem-actionpack-2_3-2.3.17-0.6.1
      rubygem-activerecord-2_3-2.3.17-0.6.1
      rubygem-activeresource-2_3-2.3.17-0.6.1
      rubygem-activesupport-2_3-2.3.17-0.6.1
      rubygem-rails-2_3-2.3.17-0.6.2

   - SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.17]:

      rubygem-actionmailer-2_3-2.3.17-0.6.1
      rubygem-actionpack-2_3-2.3.17-0.6.1
      rubygem-activerecord-2_3-2.3.17-0.6.1
      rubygem-activeresource-2_3-2.3.17-0.6.1
      rubygem-activesupport-2_3-2.3.17-0.6.1
      rubygem-rails-2_3-2.3.17-0.6.2

   - SUSE Studio Standard Edition 1.2 (noarch) [New Version: 2.3.17]:

      rubygem-rails-2.3.17-0.4.6.1

   - SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.17]:

      rubygem-actionmailer-2_3-2.3.17-0.6.1
      rubygem-actionpack-2_3-2.3.17-0.6.1
      rubygem-activerecord-2_3-2.3.17-0.6.1
      rubygem-activeresource-2_3-2.3.17-0.6.1
      rubygem-activesupport-2_3-2.3.17-0.6.1
      rubygem-rails-2_3-2.3.17-0.6.2

   - SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.17]:

      rubygem-actionmailer-2_3-2.3.17-0.6.1
      rubygem-actionpack-2_3-2.3.17-0.6.1
      rubygem-activerecord-2_3-2.3.17-0.6.1
      rubygem-activeresource-2_3-2.3.17-0.6.1
      rubygem-activesupport-2_3-2.3.17-0.6.1
      rubygem-rails-2_3-2.3.17-0.6.2


References:

   https://www.suse.com/security/cve/CVE-2012-5664.html
   https://www.suse.com/security/cve/CVE-2013-0155.html
   https://www.suse.com/security/cve/CVE-2013-0156.html
   https://www.suse.com/security/cve/CVE-2013-0276.html
   https://www.suse.com/security/cve/CVE-2013-0333.html
   https://bugzilla.novell.com/796712
   https://bugzilla.novell.com/797449
   https://bugzilla.novell.com/797452
   https://bugzilla.novell.com/800320
   https://bugzilla.novell.com/803336
   https://bugzilla.novell.com/803339
   https://login.microfocus.com/nidp/app/login

SuSE: 2013:0606-1: important: Ruby on Rails

April 3, 2013
An update that solves 5 vulnerabilities and has one errata An update that solves 5 vulnerabilities and has one errata An update that solves 5 vulnerabilities and has one errata is ...

Summary

The Ruby on Rails stack has been updated to 2.3.17 to fix various security issues and bugs. The rails gems were updated to fix: * Unsafe Query Generation Risk in Ruby on Rails (CVE-2013-0155) * Multiple vulnerabilities in parameter parsing in Action Pack (CVE-2013-0156) * SQL Injection Vulnerability in Active Record (CVE-2012-5664) * rails: Vulnerability in JSON Parser in Ruby on Rails 3.0 and 2.3 (CVE-2013-0333) * activerecord: Circumvention of attr_protected (CVE-2013-0276) * activerecord: Serialized Attributes YAML Vulnerability with Rails 2.3 and 3.0 (CVE-2013-0277) Security Issue references: * CVE-2012-5664 * CVE-2013-0155 * CVE-2013-0156 * CVE-2013-0333 * CVE-2013-0276 * CVE-2013-0276 Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - WebYaST 1.2: zypper in -t patch slewyst12-rubygem-actionmailer-2_3-7364 - SUSE Studio Standard Edition 1.2: zypper in -t patch sleslms12-rubygem-actionmailer-2_3-7364 - SUSE Studio Onsite 1.2: zypper in -t patch slestso12-rubygem-actionmailer-2_3-7364 - SUSE Studio Extension for System z 1.2: zypper in -t patch slestso12-rubygem-actionmailer-2_3-7364 To bring your system up-to-date, use "zypper patch". Package List: - WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.17]: rubygem-actionmailer-2_3-2.3.17-0.6.1 rubygem-actionpack-2_3-2.3.17-0.6.1 rubygem-activerecord-2_3-2.3.17-0.6.1 rubygem-activeresource-2_3-2.3.17-0.6.1 rubygem-activesupport-2_3-2.3.17-0.6.1 rubygem-rails-2_3-2.3.17-0.6.2 - SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.17]: rubygem-actionmailer-2_3-2.3.17-0.6.1 rubygem-actionpack-2_3-2.3.17-0.6.1 rubygem-activerecord-2_3-2.3.17-0.6.1 rubygem-activeresource-2_3-2.3.17-0.6.1 rubygem-activesupport-2_3-2.3.17-0.6.1 rubygem-rails-2_3-2.3.17-0.6.2 - SUSE Studio Standard Edition 1.2 (noarch) [New Version: 2.3.17]: rubygem-rails-2.3.17-0.4.6.1 - SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.17]: rubygem-actionmailer-2_3-2.3.17-0.6.1 rubygem-actionpack-2_3-2.3.17-0.6.1 rubygem-activerecord-2_3-2.3.17-0.6.1 rubygem-activeresource-2_3-2.3.17-0.6.1 rubygem-activesupport-2_3-2.3.17-0.6.1 rubygem-rails-2_3-2.3.17-0.6.2 - SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.17]: rubygem-actionmailer-2_3-2.3.17-0.6.1 rubygem-actionpack-2_3-2.3.17-0.6.1 rubygem-activerecord-2_3-2.3.17-0.6.1 rubygem-activeresource-2_3-2.3.17-0.6.1 rubygem-activesupport-2_3-2.3.17-0.6.1 rubygem-rails-2_3-2.3.17-0.6.2

References

#796712 #797449 #797452 #800320 #803336 #803339

Cross- CVE-2012-5664 CVE-2013-0155 CVE-2013-0156

CVE-2013-0276 CVE-2013-0333

Affected Products:

WebYaST 1.2

SUSE Studio Standard Edition 1.2

SUSE Studio Onsite 1.2

SUSE Studio Extension for System z 1.2

https://www.suse.com/security/cve/CVE-2012-5664.html

https://www.suse.com/security/cve/CVE-2013-0155.html

https://www.suse.com/security/cve/CVE-2013-0156.html

https://www.suse.com/security/cve/CVE-2013-0276.html

https://www.suse.com/security/cve/CVE-2013-0333.html

https://bugzilla.novell.com/796712

https://bugzilla.novell.com/797449

https://bugzilla.novell.com/797452

https://bugzilla.novell.com/800320

https://bugzilla.novell.com/803336

https://bugzilla.novell.com/803339

https://login.microfocus.com/nidp/app/login

Severity
Announcement ID: SUSE-SU-2013:0606-1
Rating: important

Related News