Security update for rubygem-actionpack-2_3
SUSE Security Update: Security update for rubygem-actionpack-2_3
rubygem-actionpack-2_3 has been updated to fix the
following security issues:
* CVE-2012-3465: Malformed HTML is not correctly
handled when validating with the strip_tags helper which
could result in Cross-site Scripting issues.
* CVE-2012-2694, CVE-2012-2660: Unsafe query generation
was possible using NULL queries.
The included GEM archive package was also adjusted to
contain the security fixes available in the unpacked ruby
tree.
Security Issue references:
* CVE-2012-3464
>
* CVE-2012-3465
>
Announcement ID: | SUSE-SU-2013:0208-1 |
Rating: | moderate |
References: | #765097 #766791 #775649 |
Affected Products: |
An update that solves two vulnerabilities and has one errata is now available. It includes one version update.
Description:
rubygem-actionpack-2_3 has been updated to fix the
following security issues:
* CVE-2012-3465: Malformed HTML is not correctly
handled when validating with the strip_tags helper which
could result in Cross-site Scripting issues.
* CVE-2012-2694, CVE-2012-2660: Unsafe query generation
was possible using NULL queries.
The included GEM archive package was also adjusted to
contain the security fixes available in the unpacked ruby
tree.
Security Issue references:
* CVE-2012-3464
* CVE-2012-3465
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- WebYaST 1.2:
zypper in -t patch slewyst12-rubygem-actionpack-2_3-7031
- SUSE Studio Standard Edition 1.2:
zypper in -t patch sleslms12-rubygem-actionpack-2_3-7031
- SUSE Studio Onsite 1.2:
zypper in -t patch slestso12-rubygem-actionpack-2_3-7031
- SUSE Studio Extension for System z 1.2:
zypper in -t patch slestso12-rubygem-actionpack-2_3-7031
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-rubygem-actionpack-2_3-7030
- SUSE Cloud 1.0:
zypper in -t patch sleclo10sp2-rubygem-actionpack-2_3-7030
To bring your system up-to-date, use "zypper patch".
Package List:
- WebYaST 1.2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.3.14]:
- rubygem-actionpack-2_3-2.3.14-0.7.10.1
- SUSE Studio Standard Edition 1.2 (x86_64) [New Version: 2.3.14]:
- rubygem-actionpack-2_3-2.3.14-0.7.10.1
- SUSE Studio Onsite 1.2 (x86_64) [New Version: 2.3.14]:
- rubygem-actionpack-2_3-2.3.14-0.7.10.1
- SUSE Studio Extension for System z 1.2 (s390x) [New Version: 2.3.14]:
- rubygem-actionpack-2_3-2.3.14-0.7.10.1
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):
- rubygem-actionpack-2_3-2.3.14-0.14.1
- SUSE Cloud 1.0 (x86_64):
- rubygem-actionpack-2_3-2.3.14-0.14.1
References:
- http://support.novell.com/security/cve/CVE-2012-3464.html
- http://support.novell.com/security/cve/CVE-2012-3465.html
- https://bugzilla.novell.com/765097
- https://bugzilla.novell.com/766791
- https://bugzilla.novell.com/775649
- http://download.suse.com/patch/finder/?keywords=5a3f50ddfe70ae71ea853e5983a4df46
- http://download.suse.com/patch/finder/?keywords=725ed7b159ba8946d34409cfe8334492