Security update for hawk
SUSE Security Update: Security update for hawk
hawk has been updated to fix security issues in the embedded rubygems:
* CVE-2013-4389: rubygem-actionmailer-3_1: possible DoS vulnerability
in the log subscriber component (bnc#846239)
* CVE-2013-4491: rubygem-actionpack: i18n missing translation XSS
(bnc#853625).
* CVE-2013-6414: rubygem-actionpack: Action View DoS (bnc#853633).
* CVE-2013-6415: rubygem-actionpack: number_to_currency XSS
(bnc#853632).
* CVE-2013-6417: rubygem-actionpack: unsafe query generation risk
(incomplete fix for CVE-2013-0155) (bnc#853627).
Also a minor bug has been fixed:
* Misc: hb_report: Catch ArgumentError when parsing hb_report output
(bnc#854060)
Security Issue references:
* CVE-2013-4389
* CVE-2013-4491
* CVE-2013-6414
* CVE-2013-6415
* CVE-2013-6417
Announcement ID: | SUSE-SU-2014:0686-1 |
Rating: | moderate |
References: | #846239 #853625 #853627 #853632 #853633 #854060 |
Affected Products: |
An update that solves 5 vulnerabilities and has one errata is now available.
Description:
hawk has been updated to fix security issues in the embedded rubygems:
* CVE-2013-4389: rubygem-actionmailer-3_1: possible DoS vulnerability
in the log subscriber component (bnc#846239)
* CVE-2013-4491: rubygem-actionpack: i18n missing translation XSS
(bnc#853625).
* CVE-2013-6414: rubygem-actionpack: Action View DoS (bnc#853633).
* CVE-2013-6415: rubygem-actionpack: number_to_currency XSS
(bnc#853632).
* CVE-2013-6417: rubygem-actionpack: unsafe query generation risk
(incomplete fix for CVE-2013-0155) (bnc#853627).
Also a minor bug has been fixed:
* Misc: hb_report: Catch ArgumentError when parsing hb_report output
(bnc#854060)
Security Issue references:
* CVE-2013-4389
* CVE-2013-4491
* CVE-2013-6414
* CVE-2013-6415
* CVE-2013-6417
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise High Availability Extension 11 SP3:
zypper in -t patch slehasp3-hawk-9208
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64):
- hawk-0.6.1-0.17.1
- hawk-templates-0.6.1-0.17.1
References:
- http://support.novell.com/security/cve/CVE-2013-4389.html
- http://support.novell.com/security/cve/CVE-2013-4491.html
- http://support.novell.com/security/cve/CVE-2013-6414.html
- http://support.novell.com/security/cve/CVE-2013-6415.html
- http://support.novell.com/security/cve/CVE-2013-6417.html
- https://bugzilla.novell.com/846239
- https://bugzilla.novell.com/853625
- https://bugzilla.novell.com/853627
- https://bugzilla.novell.com/853632
- https://bugzilla.novell.com/853633
- https://bugzilla.novell.com/854060
- http://download.suse.com/patch/finder/?keywords=3ee6b7518e2abed8cdf7d14760b0ab01