news 28 Posted September 13, 2016 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: rh-ror42 security update Advisory ID: RHSA-2016:1855-01 Product: Red Hat Software Collections Advisory URL: https://rhn.redhat.com/errata/RHSA-2016-1855.html Issue date: 2016-09-13 CVE Names: CVE-2016-6316 CVE-2016-6317 ===================================================================== 1. Summary: An update for rh-ror42-rubygem-actionview, rh-ror42-rubygem-activerecord, and rh-ror42-rubygem-actionpack is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - noarch Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - noarch 3. Description: Ruby on Rails is a model-view-controller (MVC) framework for web application development. Action View implements the view component, and Active Record implements the model component. Security Fix(es) in rubygem-actionview: * It was discovered that Action View tag helpers did not escape quotes when using strings declared as HTML safe as attribute values. A remote attacker could use this flaw to conduct a cross-site scripting (XSS) attack. (CVE-2016-6316) Security Fix(es) in rubygem-activerecord: * A flaw was found in the way Active Record handled certain special values in dynamic finders and relations. If a Ruby on Rails application performed JSON parameter parsing, a remote attacker could possibly manipulate search conditions in SQL queries generated by the application. (CVE-2016-6317) Red Hat would like to thank the Ruby on Rails project for reporting these issues. Upstream acknowledges Andrew Carpenter (Critical Juncture) as the original reporter of CVE-2016-6316; and joernchen (Phenoelit) as the original reporter of CVE-2016-6317. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1365008 - CVE-2016-6316 rubygem-actionview: cross-site scripting flaw in Action View 1365017 - CVE-2016-6317 rubygem-activerecord: unsafe query generation in Active Record 6. Package List: Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7): Source: rh-ror42-rubygem-actionpack-4.2.6-3.el7.src.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.src.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.src.rpm noarch: rh-ror42-rubygem-actionpack-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionpack-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-doc-4.2.6-3.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1): Source: rh-ror42-rubygem-actionpack-4.2.6-3.el7.src.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.src.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.src.rpm noarch: rh-ror42-rubygem-actionpack-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionpack-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-doc-4.2.6-3.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2): Source: rh-ror42-rubygem-actionpack-4.2.6-3.el7.src.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.src.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.src.rpm noarch: rh-ror42-rubygem-actionpack-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionpack-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-doc-4.2.6-3.el7.noarch.rpm Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7): Source: rh-ror42-rubygem-actionpack-4.2.6-3.el7.src.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.src.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.src.rpm noarch: rh-ror42-rubygem-actionpack-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionpack-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-actionview-doc-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-4.2.6-3.el7.noarch.rpm rh-ror42-rubygem-activerecord-doc-4.2.6-3.el7.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6316 https://access.redhat.com/security/cve/CVE-2016-6317 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2016 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFX1977XlSAg2UNWIIRAgmUAJ9CAZsdFov2snrXXLOrRTt0sUrfxgCgpwgG F0o+B5gJPw4TXZWYKzOkv5I= =n1+g -----END PGP SIGNATURE----- -- Share this post Link to post