[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2016:0455-01 -- Redhat ruby193-rubygem-actionpack, ruby193-rubygem-activerecord, ruby193-rubygem-activesupport

ID: oval:org.secpod.oval:def:504941Date: (C)2021-02-03   (M)2022-10-10
Class: PATCHFamily: unix




The ruby193 collection provides Ruby version 1.9.3 and Ruby on Rails version 3.2. Ruby on Rails is a model-view-controller framework for web application development. The following issues were corrected in rubygem-actionpack: Multiple directory traversal flaws were found in the way the Action View component searched for templates for rendering. If an application passed untrusted input to the "render" method, a remote, unauthenticated attacker could use these flaws to render unexpected files and, possibly, execute arbitrary code. A code injection flaw was found in the way the Action View component searched for templates for rendering. If an application passed untrusted input to the "render" method, a remote, unauthenticated attacker could use this flaw to execute arbitrary code. A flaw was found in the way the Action Pack component performed MIME type lookups. Since queries were cached in a global cache of MIME types, an attacker could use this flaw to grow the cache indefinitely, potentially resulting in a denial of service. A flaw was found in the way the Action Controller component compared user names and passwords when performing HTTP basic authentication. Time taken to compare strings could differ depending on input, possibly allowing a remote attacker to determine valid user names and passwords using a timing attack. The following issue was corrected in rubygem-activerecord: A flaw was found in the Active Record component"s handling of nested attributes in combination with the destroy flag. An attacker could possibly use this flaw to set attributes to invalid values or clear all attributes. Red Hat would like to thank the Ruby on Rails project for reporting these issues. Upstream acknowledges John Poulin as the original reporter of CVE-2016-0752, Jyoti Singh and Tobias Kraze as original reporters of CVE-2016-2097, Tobias Kraze and joernchen as original reporters of CVE-2016-2098, Aaron Patterson as the original reporter of CVE-2016-0751, Daniel Waterworth as the original reporter of CVE-2015-7576, and Justin Coyne as the original reporter of CVE-2015-7577. All ruby193 collection rubygem-actionpack and rubygem-activerecord packages users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using the ruby193 collection must be restarted for this update to take effect.

Platform:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 6
Product:
ruby193-rubygem-actionpack
ruby193-rubygem-activerecord
ruby193-rubygem-activesupport
Reference:
RHSA-2016:0455-01
CVE-2015-7576
CVE-2015-7577
CVE-2016-0751
CVE-2016-0752
CVE-2016-2097
CVE-2016-2098
CVE    6
CVE-2016-0751
CVE-2016-2098
CVE-2016-2097
CVE-2015-7576
...
CPE    5
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6
cpe:/a:rubygem:ruby193-rubygem-activesupport
cpe:/a:rubygem:ruby193-rubygem-actionpack
...

© SecPod Technologies