SUSE-SU-2013:0355-1: moderate: Security update for rubygem-rack

sle-updates at lists.suse.com sle-updates at lists.suse.com
Wed Feb 27 16:12:22 MST 2013


   SUSE Security Update: Security update for rubygem-rack
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0355-1
Rating:             moderate
References:         #798452 #802794 
Cross-References:   CVE-2012-6109 CVE-2013-0183 CVE-2013-0184
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP2
______________________________________________________________________________

   An update that fixes three vulnerabilities is now
   available. It includes one version update.

Description:


   3 denial of service conditions in the Rack 1.3 rubygem have
   been fixed.

   *

   Rack was updated to 1.3.10:

   o Fix CVE-2013-0263, timing attack against
   Rack::Session::Cookie
   *

   Rack was updated to 1.3.9.

   o Rack::Auth::AbstractRequest no longer
   symbolizes arbitrary strings (CVE-2013-0184) o Security:
   Prevent unbounded reads in large multipart boundaries
   (CVE-2013-0183)
   *

   Changes from 1.3.7 (CVE-2012-6109)

   o Add warnings when users do not provide a
   session secret o Fix parsing performance for unquoted
   filenames o Updated URI backports o Fix URI backport
   version matching, and silence constant warnings o Correct
   parameter parsing with empty values o Correct rackup '-I'
   flag, to allow multiple uses o Correct rackup pidfile
   handling o Report rackup line numbers correctly o Fix
   request loops caused by non-stale nonces with time limits o
   Prevent infinite recursions from Response#to_ary o Various
   middleware better conforms to the body close specification
   o Updated language for the body close specification o
   Additional notes regarding ECMA escape compatibility issues
   o Fix the parsing of multiple ranges in range headers

   Security Issue references:

   * CVE-2013-0184
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0184
   >
   * CVE-2013-0183
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0183
   >
   * CVE-2012-6109
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6109
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP2:

      zypper in -t patch sdksp2-rack-13-201302-7387

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 1.3.10]:

      rubygem-rack-1_3-1.3.10-0.5.1


References:

   http://support.novell.com/security/cve/CVE-2012-6109.html
   http://support.novell.com/security/cve/CVE-2013-0183.html
   http://support.novell.com/security/cve/CVE-2013-0184.html
   https://bugzilla.novell.com/798452
   https://bugzilla.novell.com/802794
   http://download.novell.com/patch/finder/?keywords=79d7c27e638d31315b618ea99bba68b5



More information about the sle-updates mailing list