Security update for hawk

SUSE Security Update: Security update for hawk
Announcement ID: SUSE-SU-2013:0194-1
Rating: moderate
References: #765097 #766791 #775649 #775653
Affected Products:
  • SUSE Linux Enterprise High Availability Extension 11 SP2

  • An update that solves two vulnerabilities and has two fixes is now available. It includes one version update.

    Description:


    hawk has been rebuilt to include updated ruby gems that
    contain fixes for security issues.

    rubygem-activesupport-2_3 has been updated to fix the
    following security issue:

    * This update also the HTML escaping code in Ruby on
    Rails. CVE-2012-3464 has been assigned to this issue.

    rubygem-actionpack-2_3 has been updated to fix the
    following security issues:

    * CVE-2012-3465: Malformed HTML is not correctly
    handled when validating with the strip_tags helper which
    could result in Cross-site Scripting issues.
    * CVE-2012-2694, CVE-2012-2660: Unsafe query generation
    was possible using NULL queries.

    The included GEM archive package was also adjusted to
    contain the security fixes available in the unpacked ruby
    tree.

    Security Issue references:

    * CVE-2012-3464
    >
    * CVE-2012-3465
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise High Availability Extension 11 SP2:
      zypper in -t patch sleshasp2-hawk-7078

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise High Availability Extension 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 0.5.2]:
    • hawk-0.5.2-0.38.16
    • hawk-templates-0.5.2-0.38.16

    References:

    • http://support.novell.com/security/cve/CVE-2012-3464.html
    • http://support.novell.com/security/cve/CVE-2012-3465.html
    • https://bugzilla.novell.com/765097
    • https://bugzilla.novell.com/766791
    • https://bugzilla.novell.com/775649
    • https://bugzilla.novell.com/775653
    • http://download.suse.com/patch/finder/?keywords=6a53a5d8c6e366542686771cc89925c3