SUSE-SU-2014:0686-1: moderate: Security update for hawk

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Tue May 20 19:04:12 MDT 2014


   SUSE Security Update: Security update for hawk
______________________________________________________________________________

Announcement ID:    SUSE-SU-2014:0686-1
Rating:             moderate
References:         #846239 #853625 #853627 #853632 #853633 #854060 
                    
Cross-References:   CVE-2013-4389 CVE-2013-4491 CVE-2013-6414
                    CVE-2013-6415 CVE-2013-6417
Affected Products:
                    SUSE Linux Enterprise High Availability Extension 11 SP3
______________________________________________________________________________

   An update that solves 5 vulnerabilities and has one errata
   is now available.

Description:


   hawk has been updated to fix security issues in the embedded rubygems:

       * CVE-2013-4389: rubygem-actionmailer-3_1: possible DoS vulnerability
         in the log subscriber component (bnc#846239)
       * CVE-2013-4491: rubygem-actionpack: i18n missing translation XSS
         (bnc#853625).
       * CVE-2013-6414: rubygem-actionpack: Action View DoS (bnc#853633).
       * CVE-2013-6415: rubygem-actionpack: number_to_currency XSS
         (bnc#853632).
       * CVE-2013-6417: rubygem-actionpack: unsafe query generation risk
         (incomplete fix for CVE-2013-0155) (bnc#853627).

   Also a minor bug has been fixed:

       * Misc: hb_report: Catch ArgumentError when parsing hb_report output
         (bnc#854060)

   Security Issue references:

       * CVE-2013-4389
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4389>
       * CVE-2013-4491
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4491>
       * CVE-2013-6414
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6414>
       * CVE-2013-6415
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6415>
       * CVE-2013-6417
         <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6417>


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise High Availability Extension 11 SP3:

      zypper in -t patch slehasp3-hawk-9208

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise High Availability Extension 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      hawk-0.6.1-0.17.1
      hawk-templates-0.6.1-0.17.1


References:

   http://support.novell.com/security/cve/CVE-2013-4389.html
   http://support.novell.com/security/cve/CVE-2013-4491.html
   http://support.novell.com/security/cve/CVE-2013-6414.html
   http://support.novell.com/security/cve/CVE-2013-6415.html
   http://support.novell.com/security/cve/CVE-2013-6417.html
   https://bugzilla.novell.com/846239
   https://bugzilla.novell.com/853625
   https://bugzilla.novell.com/853627
   https://bugzilla.novell.com/853632
   https://bugzilla.novell.com/853633
   https://bugzilla.novell.com/854060
   http://download.suse.com/patch/finder/?keywords=3ee6b7518e2abed8cdf7d14760b0ab01



More information about the sle-security-updates mailing list