Mailinglist Archive: opensuse-security-announce (29 mails)
< Previous | Next > |
[security-announce] SUSE-SU-2012:1015-1: important: Security update for rubygem-actionpack
- From: opensuse-security@xxxxxxxxxxxx
- Date: Tue, 21 Aug 2012 20:08:29 +0200 (CEST)
- Message-id: <20120821180829.988F732249@maintenance.suse.de>
SUSE Security Update: Security update for rubygem-actionpack
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:1015-1
Rating: important
References: #765097 #766791
Cross-References: CVE-2012-2660 CVE-2012-2694
Affected Products:
WebYaST [Appliance - Tools]
WebYaST 1.2
SUSE Studio Standard Edition 1.2
SUSE Studio Onsite 1.2
SUSE Studio Extension for System z 1.2
SUSE Linux Enterprise Software Development Kit 11 SP1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
It includes one version update.
Description:
This update to rubygem-actionpack fixes two unsafe query
generations with "IS NULL" in the WHERE clause.
(CVE-2012-2660
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2660
> , CVE-2012-2694
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2694
> )
Indications:
Everyone using rubygem-actionpack should update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- WebYaST [Appliance - Tools]:
zypper in -t patch slewystsp1-rubygem-actionpack-2_3-6619
- WebYaST 1.2:
zypper in -t patch slewyst12-rubygem-actionpack-2_3-6665
- SUSE Studio Standard Edition 1.2:
zypper in -t patch sleslms12-rubygem-actionpack-2_3-6665
- SUSE Studio Onsite 1.2:
zypper in -t patch slestso12-rubygem-actionpack-2_3-6665
- SUSE Studio Extension for System z 1.2:
zypper in -t patch slestso12-rubygem-actionpack-2_3-6665
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-rubygem-actionpack-2_3-6619
To bring your system up-to-date, use "zypper patch".
Package List:
- WebYaST [Appliance - Tools] (i586 ia64 ppc64 s390x x86_64) [New Version:
2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
- WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
- SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
- SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
- SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64
s390x x86_64) [New Version: 2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
References:
http://support.novell.com/security/cve/CVE-2012-2660.html
http://support.novell.com/security/cve/CVE-2012-2694.html
https://bugzilla.novell.com/765097
https://bugzilla.novell.com/766791
http://download.novell.com/patch/finder/?keywords=53095f9d9f8560f19044c15e6eaf7b8a
http://download.novell.com/patch/finder/?keywords=625e07d428b32e10138b5c46031ea3fe
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx
______________________________________________________________________________
Announcement ID: SUSE-SU-2012:1015-1
Rating: important
References: #765097 #766791
Cross-References: CVE-2012-2660 CVE-2012-2694
Affected Products:
WebYaST [Appliance - Tools]
WebYaST 1.2
SUSE Studio Standard Edition 1.2
SUSE Studio Onsite 1.2
SUSE Studio Extension for System z 1.2
SUSE Linux Enterprise Software Development Kit 11 SP1
______________________________________________________________________________
An update that fixes two vulnerabilities is now available.
It includes one version update.
Description:
This update to rubygem-actionpack fixes two unsafe query
generations with "IS NULL" in the WHERE clause.
(CVE-2012-2660
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2660
> , CVE-2012-2694
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2694
> )
Indications:
Everyone using rubygem-actionpack should update.
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- WebYaST [Appliance - Tools]:
zypper in -t patch slewystsp1-rubygem-actionpack-2_3-6619
- WebYaST 1.2:
zypper in -t patch slewyst12-rubygem-actionpack-2_3-6665
- SUSE Studio Standard Edition 1.2:
zypper in -t patch sleslms12-rubygem-actionpack-2_3-6665
- SUSE Studio Onsite 1.2:
zypper in -t patch slestso12-rubygem-actionpack-2_3-6665
- SUSE Studio Extension for System z 1.2:
zypper in -t patch slestso12-rubygem-actionpack-2_3-6665
- SUSE Linux Enterprise Software Development Kit 11 SP1:
zypper in -t patch sdksp1-rubygem-actionpack-2_3-6619
To bring your system up-to-date, use "zypper patch".
Package List:
- WebYaST [Appliance - Tools] (i586 ia64 ppc64 s390x x86_64) [New Version:
2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
- WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
- SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
- SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
- SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
- SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64
s390x x86_64) [New Version: 2.3.14]:
rubygem-actionpack-2_3-2.3.14-0.7.6.1
References:
http://support.novell.com/security/cve/CVE-2012-2660.html
http://support.novell.com/security/cve/CVE-2012-2694.html
https://bugzilla.novell.com/765097
https://bugzilla.novell.com/766791
http://download.novell.com/patch/finder/?keywords=53095f9d9f8560f19044c15e6eaf7b8a
http://download.novell.com/patch/finder/?keywords=625e07d428b32e10138b5c46031ea3fe
--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@xxxxxxxxxxxx
For additional commands, e-mail: opensuse-security-announce+help@xxxxxxxxxxxx
< Previous | Next > |