openSUSE Security Update: ruby on rails to 2.3.16 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2013:0280-1 Rating: important References: #766792 #775649 #775653 #796712 #797449 #797452 #798452 #798458 #800320 Cross-References: CVE-2012-2695 CVE-2012-5664 CVE-2013-0155 CVE-2013-0156 CVE-2013-0333 Affected Products: openSUSE 11.4 ______________________________________________________________________________ An update that solves 5 vulnerabilities and has four fixes is now available. Description: This update updates the RubyOnRails 2.3 stack to 2.3.16. Security and bugfixes were done, foremost: CVE-2013-0333: A JSON sql/code injection problem was fixed. CVE-2012-5664: A SQL Injection Vulnerability in Active Record was fixed. CVE-2012-2695: A SQL injection via nested hashes in conditions was fixed. CVE-2013-0155: Unsafe Query Generation Risk in Ruby on Rails was fixed. CVE-2013-0156: Multiple vulnerabilities in parameter parsing in Action Pack were fixed. CVE-2012-5664: options hashes should only be extracted if there are extra parameters CVE-2012-2695: Fix SQL injection via nested hashes in conditions CVE-2013-0156: Hash.from_xml raises when it encounters type="symbol" or type="yaml". Use Hash.from_trusted_xml to parse this XM Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch 2013-21 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64): rubygem-actionmailer-2_3-2.3.16-0.16.1 rubygem-actionmailer-2_3-doc-2.3.16-0.16.1 rubygem-actionmailer-2_3-testsuite-2.3.16-0.16.1 rubygem-actionpack-2_3-2.3.16-0.23.1 rubygem-actionpack-2_3-doc-2.3.16-0.23.1 rubygem-actionpack-2_3-testsuite-2.3.16-0.23.1 rubygem-activerecord-2_3-2.3.16-0.19.1 rubygem-activerecord-2_3-doc-2.3.16-0.19.1 rubygem-activerecord-2_3-testsuite-2.3.16-0.19.1 rubygem-activeresource-2_3-2.3.16-0.16.1 rubygem-activeresource-2_3-doc-2.3.16-0.16.1 rubygem-activeresource-2_3-testsuite-2.3.16-0.16.1 rubygem-activesupport-2_3-2.3.16-0.16.1 rubygem-activesupport-2_3-doc-2.3.16-0.16.1 rubygem-rack-1.1.5-0.8.1 rubygem-rails-2_3-2.3.16-0.12.1 rubygem-rails-2_3-doc-2.3.16-0.12.1 - openSUSE 11.4 (noarch): rubygem-actionmailer-2.3.16-0.6.1 rubygem-actionpack-2.3.16-0.6.1 rubygem-activerecord-2.3.16-0.6.1 rubygem-activeresource-2.3.16-0.6.1 rubygem-activesupport-2.3.16-0.6.1 rubygem-rails-2.3.16-0.6.1 References: http://support.novell.com/security/cve/CVE-2012-2695.html http://support.novell.com/security/cve/CVE-2012-5664.html http://support.novell.com/security/cve/CVE-2013-0155.html http://support.novell.com/security/cve/CVE-2013-0156.html http://support.novell.com/security/cve/CVE-2013-0333.html https://bugzilla.novell.com/766792 https://bugzilla.novell.com/775649 https://bugzilla.novell.com/775653 https://bugzilla.novell.com/796712 https://bugzilla.novell.com/797449 https://bugzilla.novell.com/797452 https://bugzilla.novell.com/798452 https://bugzilla.novell.com/798458 https://bugzilla.novell.com/800320 -- To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-security-announce+help@opensuse.org