SUSE-SU-2014:0458-2: moderate: Security update for rubygem-i18
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Wed May 28 13:05:29 MDT 2014
SUSE Security Update: Security update for rubygem-i18
______________________________________________________________________________
Announcement ID: SUSE-SU-2014:0458-2
Rating: moderate
References: #854166 #855139 #864873
Cross-References: CVE-2013-4492
Affected Products:
WebYaST 1.3
SUSE Studio Onsite 1.3
SUSE Lifecycle Management Server 1.3
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
rubygem-i18-0_6 has been updated to fix a security issue:
* Cross-site scripting (XSS) vulnerability in exceptions.rb in the
i18n gem before 0.6.6 for Ruby allowed remote attackers to inject
arbitrary web script or HTML via a crafted
I18n::MissingTranslationData.new call.
Additionally, the package requires Ruby directly now, and also applies the
security patch to the bundled .gem file.
Security Issue reference:
* CVE-2013-4492
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4492>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- WebYaST 1.3:
zypper in -t patch slewyst13-rubygem-i18n-0_6-8936
- SUSE Studio Onsite 1.3:
zypper in -t patch slestso13-rubygem-i18n-0_6-8936
- SUSE Lifecycle Management Server 1.3:
zypper in -t patch sleslms13-rubygem-i18n-0_6-8936
To bring your system up-to-date, use "zypper patch".
Package List:
- WebYaST 1.3 (i586 ia64 ppc64 s390x x86_64):
rubygem-i18n-0_6-0.6.0-0.8.1
- SUSE Studio Onsite 1.3 (x86_64):
rubygem-i18n-0_6-0.6.0-0.8.1
- SUSE Lifecycle Management Server 1.3 (x86_64):
rubygem-i18n-0_6-0.6.0-0.8.1
References:
http://support.novell.com/security/cve/CVE-2013-4492.html
https://bugzilla.novell.com/854166
https://bugzilla.novell.com/855139
https://bugzilla.novell.com/864873
http://download.suse.com/patch/finder/?keywords=3ddac1f470785a8fbeb71b67f28e96b5
More information about the sle-updates
mailing list