[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2016:0454-01 -- Redhat ror40-rubygem-actionpack, ror40-rubygem-activerecord, ror40-rubygem-activesupport

ID: oval:org.secpod.oval:def:504979Date: (C)2021-02-03   (M)2022-10-10
Class: PATCHFamily: unix




The ror40 collection provides Ruby on Rails version 4.0. Ruby on Rails is a model-view-controller framework for web application development. The following issues were corrected in rubygem-actionpack: Multiple directory traversal flaws were found in the way the Action View component searched for templates for rendering. If an application passed untrusted input to the "render" method, a remote, unauthenticated attacker could use these flaws to render unexpected files and, possibly, execute arbitrary code. A code injection flaw was found in the way the Action View component searched for templates for rendering. If an application passed untrusted input to the "render" method, a remote, unauthenticated attacker could use this flaw to execute arbitrary code. A flaw was found in the way the Action Pack component performed MIME type lookups. Since queries were cached in a global cache of MIME types, an attacker could use this flaw to grow the cache indefinitely, potentially resulting in a denial of service. A flaw was found in the Action Pack component"s caching of controller references. An attacker could use this flaw to cause unbounded memory growth, potentially resulting in a denial of service. A flaw was found in the way the Action Controller component compared user names and passwords when performing HTTP basic authentication. Time taken to compare strings could differ depending on input, possibly allowing a remote attacker to determine valid user names and passwords using a timing attack. The following issue was corrected in rubygem-activerecord: A flaw was found in the Active Record component"s handling of nested attributes in combination with the destroy flag. An attacker could possibly use this flaw to set attributes to invalid values or clear all attributes. Red Hat would like to thank the Ruby on Rails project for reporting these issues. Upstream acknowledges John Poulin as the original reporter of CVE-2016-0752, Jyoti Singh and Tobias Kraze as original reporters of CVE-2016-2097, Tobias Kraze and joernchen as original reporters of CVE-2016-2098, Aaron Patterson as the original reporter of CVE-2016-0751, Daniel Waterworth as the original reporter of CVE-2015-7576, and Justin Coyne as the original reporter of CVE-2015-7577. All ror40 collection rubygem-actionpack and rubygem-activerecord packages users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. All running applications using the ror40 collection must be restarted for this update to take effect.

Platform:
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 6
Product:
ror40-rubygem-actionpack
ror40-rubygem-activerecord
ror40-rubygem-activesupport
Reference:
RHSA-2016:0454-01
CVE-2015-7576
CVE-2015-7577
CVE-2015-7581
CVE-2016-0751
CVE-2016-0752
CVE-2016-2097
CVE-2016-2098
CVE    7
CVE-2016-0751
CVE-2016-2098
CVE-2016-2097
CVE-2015-7581
...
CPE    5
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:6
cpe:/a:rubygem:ror40-rubygem-activerecord
cpe:/a:rubygem:ror40-rubygem-actionpack
...

© SecPod Technologies