Mailinglist Archive: opensuse-security-announce (29 mails)

< Previous Next >
[security-announce] SUSE-SU-2012:1012-1: important: Security update for rubygem-actionpack
SUSE Security Update: Security update for rubygem-actionpack
______________________________________________________________________________

Announcement ID: SUSE-SU-2012:1012-1
Rating: important
References: #765097 #766791
Cross-References: CVE-2012-2660 CVE-2012-2661 CVE-2012-2694
CVE-2012-2695
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
______________________________________________________________________________

An update that fixes four vulnerabilities is now available.

Description:


This update to rubygem-actionpack fixes two unsafe query
generations with "IS NULL" in the WHERE clause.
(CVE-2012-2660
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2660
> , CVE-2012-2694
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2694
> )

Indications:

Everyone using rubygem-actionpack should update.

Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Software Development Kit 11 SP2:

zypper in -t patch sdksp2-rubygem-actionpack-2_3-6630

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64
s390x x86_64):

rubygem-actionpack-2_3-2.3.14-0.10.1


References:

http://support.novell.com/security/cve/CVE-2012-2660.html
http://support.novell.com/security/cve/CVE-2012-2661.html
http://support.novell.com/security/cve/CVE-2012-2694.html
http://support.novell.com/security/cve/CVE-2012-2695.html
https://bugzilla.novell.com/765097
https://bugzilla.novell.com/766791

http://download.novell.com/patch/finder/?keywords=2f5d4cde838678b72eb3a71ff9624a5c

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx

< Previous Next >
This Thread
  • No further messages