openSUSE Security Update: VUL-0: ruby on rails multiple vulnerabilities ______________________________________________________________________________ Announcement ID: openSUSE-SU-2011:1305-1 Rating: moderate References: #668817 #712057 #712058 #712062 Cross-References: CVE-2010-3933 CVE-2011-0446 CVE-2011-0447 CVE-2011-0448 CVE-2011-0449 CVE-2011-2930 CVE-2011-2931 CVE-2011-3186 Affected Products: openSUSE 11.4 openSUSE 11.3 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. It includes two new package versions. Description: This update of rails fixes the following security issues: CVE-2011-2930 - SQL-injection in quote_table_name function via specially crafted column names (bnc#712062) CVE-2011-2931 - Cross-Site Scripting (XSS) in the strip_tags helper (bnc#712057) CVE-2011-3186 - Response Splitting (bnc#712058) CVE-2010-3933 - Arbitrary modification of records via specially crafted form parameters (bnc#712058) CVE-2011-0446 - Cross-Site Scripting (XSS) in the mail_to helper (bnc#668817) CVE-2011-0447 - Improper validation of 'X-Requested-With' header (bnc#668817) CVE-2011-0448 - SQL-injection caused by improperly sanitized arguments to the limit function (bnc#668817) CVE-2011-0449 - Bypass of access restrictions via specially crafted action names (bnc#668817) Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch rubygem-actionmailer-5440 - openSUSE 11.3: zypper in -t patch rubygem-actionmailer-5440 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 11.4 (i586 x86_64): rubygem-actionmailer-2_3-2.3.14-0.3.1 rubygem-actionmailer-2_3-doc-2.3.14-0.3.1 rubygem-actionmailer-2_3-testsuite-2.3.14-0.3.1 rubygem-actionpack-2_3-2.3.14-0.3.1 rubygem-actionpack-2_3-doc-2.3.14-0.3.1 rubygem-actionpack-2_3-testsuite-2.3.14-0.3.1 rubygem-activerecord-2_3-2.3.14-0.3.1 rubygem-activerecord-2_3-doc-2.3.14-0.3.1 rubygem-activerecord-2_3-testsuite-2.3.14-0.3.1 rubygem-activeresource-2_3-2.3.14-0.3.1 rubygem-activeresource-2_3-doc-2.3.14-0.3.1 rubygem-activeresource-2_3-testsuite-2.3.14-0.3.1 rubygem-activesupport-2_3-2.3.14-0.3.1 rubygem-activesupport-2_3-doc-2.3.14-0.3.1 rubygem-rack-1.1.2-0.3.1 rubygem-rails-2_3-2.3.14-0.3.1 rubygem-rails-2_3-doc-2.3.14-0.3.1 - openSUSE 11.4 (noarch): rubygem-actionmailer-2.3.14-0.3.1 rubygem-actionpack-2.3.14-0.3.1 rubygem-activerecord-2.3.14-0.3.1 rubygem-activeresource-2.3.14-0.3.1 rubygem-activesupport-2.3.14-0.3.1 rubygem-rails-2.3.14-0.3.1 - openSUSE 11.3 (i586 x86_64) [New Version: 1.1.2 and 2.3.14]: rubygem-actionmailer-2_3-2.3.14-0.3.1 rubygem-actionpack-2_3-2.3.14-0.2.1 rubygem-activerecord-2_3-2.3.14-0.3.1 rubygem-activeresource-2_3-2.3.14-0.3.1 rubygem-activesupport-2_3-2.3.14-0.3.1 rubygem-rack-1.1.2-0.3.1 rubygem-rails-2_3-2.3.14-0.3.1 - openSUSE 11.3 (noarch) [New Version: 2.3.14]: rubygem-actionmailer-2.3.14-0.3.1 rubygem-actionpack-2.3.14-0.3.1 rubygem-activerecord-2.3.14-0.3.1 rubygem-activeresource-2.3.14-0.3.1 rubygem-activesupport-2.3.14-0.3.1 rubygem-rails-2.3.14-0.3.1 References: http://support.novell.com/security/cve/CVE-2010-3933.html http://support.novell.com/security/cve/CVE-2011-0446.html http://support.novell.com/security/cve/CVE-2011-0447.html http://support.novell.com/security/cve/CVE-2011-0448.html http://support.novell.com/security/cve/CVE-2011-0449.html http://support.novell.com/security/cve/CVE-2011-2930.html http://support.novell.com/security/cve/CVE-2011-2931.html http://support.novell.com/security/cve/CVE-2011-3186.html https://bugzilla.novell.com/668817 https://bugzilla.novell.com/712057 https://bugzilla.novell.com/712058 https://bugzilla.novell.com/712062