CWE
79 89 20
Advisory Published

RHSA-2013:0582: Moderate: Red Hat OpenShift Enterprise 1.1.1 update

First published: Thu Feb 28 2013(Updated: )

OpenShift Enterprise is a cloud computing Platform-as-a-Service (PaaS)<br>solution from Red Hat, and is designed for on-premise or private cloud<br>deployments.<br>Installing the updated packages and restarting the OpenShift services are<br>the only requirements for this update. However, if you are updating your<br>system to Red Hat Enterprise Linux 6.4 while applying OpenShift Enterprise<br>1.1.1 updates, it is recommended that you restart your system.<br>For further information about this release, refer to the OpenShift<br>Enterprise 1.1.1 Technical Notes, available shortly from<br><a href="https://access.redhat.com/knowledge/docs/" target="_blank">https://access.redhat.com/knowledge/docs/</a> This update also fixes the following security issues:<br>Multiple cross-site scripting (XSS) flaws were found in rubygem-actionpack.<br>A remote attacker could use these flaws to conduct XSS attacks against<br>users of an application using rubygem-actionpack. (CVE-2012-3463,<br>CVE-2012-3464, CVE-2012-3465)<br>It was found that certain methods did not sanitize file names before<br>passing them to lower layer routines in Ruby. If a Ruby application created<br>files with names based on untrusted input, it could result in the creation<br>of files with different names than expected. (CVE-2012-4522)<br>A denial of service flaw was found in the implementation of associative<br>arrays (hashes) in Ruby. An attacker able to supply a large number of<br>inputs to a Ruby application (such as HTTP POST request parameters sent to<br>a web application) that are used as keys when inserting data into an array<br>could trigger multiple hash function collisions, making array operations<br>take an excessive amount of CPU time. To mitigate this issue, a new, more<br>collision resistant algorithm has been used to reduce the chance of an<br>attacker successfully causing intentional collisions. (CVE-2012-5371)<br>Input validation vulnerabilities were discovered in rubygem-activerecord.<br>A remote attacker could possibly use these flaws to perform an SQL<br>injection attack against an application using rubygem-activerecord.<br>(CVE-2012-2661, CVE-2012-2695, CVE-2013-0155)<br>Input validation vulnerabilities were discovered in rubygem-actionpack. A<br>remote attacker could possibly use these flaws to perform an SQL injection<br>attack against an application using rubygem-actionpack and<br>rubygem-activerecord. (CVE-2012-2660, CVE-2012-2694)<br>A flaw was found in the HTTP digest authentication implementation in<br>rubygem-actionpack. A remote attacker could use this flaw to cause a<br>denial of service of an application using rubygem-actionpack and digest<br>authentication. (CVE-2012-3424)<br>A flaw was found in the handling of strings in Ruby safe level 4. A remote<br>attacker can use Exception#to_s to destructively modify an untainted string<br>so that it is tainted, the string can then be arbitrarily modified.<br>(CVE-2012-4466)<br>A flaw was found in the method for translating an exception message into a<br>string in the Ruby Exception class. A remote attacker could use this flaw<br>to bypass safe level 4 restrictions, allowing untrusted (tainted) code to<br>modify arbitrary, trusted (untainted) strings, which safe level 4<br>restrictions would otherwise prevent. (CVE-2012-4464)<br>It was found that ruby_parser from rubygem-ruby_parser created a temporary<br>file in an insecure way. A local attacker could use this flaw to perform a<br>symbolic link attack, overwriting arbitrary files accessible to the<br>application using ruby_parser. (CVE-2013-0162)<br>The CVE-2013-0162 issue was discovered by Michael Scherer of the Red Hat<br>Regional IT team.<br>Users are advised to upgrade to Red Hat OpenShift Enterprise 1.1.1.<br>

Affected SoftwareAffected VersionHow to fix
redhat/graphviz<2.26.0-10.el6
2.26.0-10.el6
redhat/openshift-console<0.0.16-1.el6
0.0.16-1.el6
redhat/openshift-origin-broker<1.0.11-1.el6
1.0.11-1.el6
redhat/openshift-origin-broker-util<1.0.15-1.el6
1.0.15-1.el6
redhat/ruby193-ruby<1.9.3.327-25.el6
1.9.3.327-25.el6
redhat/ruby193-rubygem-actionpack<3.2.8-3.el6
3.2.8-3.el6
redhat/ruby193-rubygem-activemodel<3.2.8-2.el6
3.2.8-2.el6
redhat/ruby193-rubygem-activerecord<3.2.8-3.el6
3.2.8-3.el6
redhat/ruby193-rubygem-railties<3.2.8-2.el6
3.2.8-2.el6
redhat/rubygem-actionpack<3.0.13-4.el6
3.0.13-4.el6
redhat/rubygem-activemodel<3.0.13-3.el6
3.0.13-3.el6
redhat/rubygem-activerecord<3.0.13-5.el6
3.0.13-5.el6
redhat/rubygem-bson<1.8.1-2.el6
1.8.1-2.el6
redhat/rubygem-mongo<1.8.1-2.el6
1.8.1-2.el6
redhat/rubygem-openshift-origin-auth-remote-user<1.0.5-1.el6
1.0.5-1.el6
redhat/rubygem-openshift-origin-console<1.0.10-1.el6
1.0.10-1.el6
redhat/rubygem-openshift-origin-controller<1.0.12-1.el6
1.0.12-1.el6
redhat/graphviz<2.26.0-10.el6
2.26.0-10.el6
redhat/graphviz-debuginfo<2.26.0-10.el6
2.26.0-10.el6
redhat/graphviz-devel<2.26.0-10.el6
2.26.0-10.el6
redhat/graphviz-doc<2.26.0-10.el6
2.26.0-10.el6
redhat/graphviz-gd<2.26.0-10.el6
2.26.0-10.el6
redhat/graphviz-ruby<2.26.0-10.el6
2.26.0-10.el6
redhat/ruby193-ruby<1.9.3.327-25.el6
1.9.3.327-25.el6
redhat/ruby193-ruby-debuginfo<1.9.3.327-25.el6
1.9.3.327-25.el6
redhat/ruby193-ruby-devel<1.9.3.327-25.el6
1.9.3.327-25.el6
redhat/ruby193-ruby-doc<1.9.3.327-25.el6
1.9.3.327-25.el6
redhat/ruby193-ruby-irb<1.9.3.327-25.el6
1.9.3.327-25.el6
redhat/ruby193-ruby-libs<1.9.3.327-25.el6
1.9.3.327-25.el6
redhat/ruby193-ruby-tcltk<1.9.3.327-25.el6
1.9.3.327-25.el6
redhat/ruby193-rubygem-actionpack<3.2.8-3.el6
3.2.8-3.el6
redhat/ruby193-rubygem-actionpack-doc<3.2.8-3.el6
3.2.8-3.el6
redhat/ruby193-rubygem-activemodel<3.2.8-2.el6
3.2.8-2.el6
redhat/ruby193-rubygem-activemodel-doc<3.2.8-2.el6
3.2.8-2.el6
redhat/ruby193-rubygem-activerecord<3.2.8-3.el6
3.2.8-3.el6
redhat/ruby193-rubygem-activerecord-doc<3.2.8-3.el6
3.2.8-3.el6
redhat/ruby193-rubygem-bigdecimal<1.1.0-25.el6
1.1.0-25.el6
redhat/ruby193-rubygem-io-console<0.3-25.el6
0.3-25.el6
redhat/ruby193-rubygem-json<1.5.4-25.el6
1.5.4-25.el6
redhat/ruby193-rubygem-minitest<2.5.1-25.el6
2.5.1-25.el6
redhat/ruby193-rubygem-railties<3.2.8-2.el6
3.2.8-2.el6
redhat/ruby193-rubygem-railties-doc<3.2.8-2.el6
3.2.8-2.el6
redhat/ruby193-rubygem-rake<0.9.2.2-25.el6
0.9.2.2-25.el6
redhat/ruby193-rubygem-rdoc<3.9.4-25.el6
3.9.4-25.el6
redhat/ruby193-rubygems<1.8.23-25.el6
1.8.23-25.el6
redhat/ruby193-rubygems-devel<1.8.23-25.el6
1.8.23-25.el6
redhat/rubygem-activemodel-doc<3.0.13-3.el6
3.0.13-3.el6
redhat/rubygem-mongo-doc<1.8.1-2.el6
1.8.1-2.el6
redhat/rubygem-openshift-origin-console-doc<1.0.10-1.el6
1.0.10-1.el6
redhat/openshift-origin-cartridge-cron<1.4-1.0.3-1.el6
1.4-1.0.3-1.el6
redhat/openshift-origin-cartridge-diy<0.1-1.0.3-1.el6
0.1-1.0.3-1.el6
redhat/openshift-origin-cartridge-haproxy<1.4-1.0.4-1.el6
1.4-1.0.4-1.el6
redhat/openshift-origin-cartridge-jbossews<1.0-1.0.13-1.el6
1.0-1.0.13-1.el6
redhat/openshift-origin-cartridge-jenkins<1.4-1.0.2-1.el6
1.4-1.0.2-1.el6
redhat/openshift-origin-cartridge-jenkins-client<1.4-1.0.2-1.el6
1.4-1.0.2-1.el6
redhat/openshift-origin-cartridge-mysql<5.1-1.0.5-1.el6
5.1-1.0.5-1.el6
redhat/openshift-origin-cartridge-perl<5.10-1.0.3-1.el6
5.10-1.0.3-1.el6
redhat/openshift-origin-cartridge-php<5.3-1.0.5-1.el6
5.3-1.0.5-1.el6
redhat/openshift-origin-cartridge-postgresql<8.4-1.0.3-2.el6
8.4-1.0.3-2.el6
redhat/openshift-origin-cartridge-ruby<1.8-1.0.7-1.el6
1.8-1.0.7-1.el6
redhat/openshift-origin-cartridge-ruby<1.9-scl-1.0.8-1.el6
1.9-scl-1.0.8-1.el6
redhat/openshift-origin-msg-node-mcollective<1.0.3-1.el6
1.0.3-1.el6
redhat/php<5.3.3-22.el6
5.3.3-22.el6
redhat/rubygem-openshift-origin-node<1.0.11-1.el6
1.0.11-1.el6
redhat/php-bcmath<5.3.3-22.el6
5.3.3-22.el6
redhat/php-debuginfo<5.3.3-22.el6
5.3.3-22.el6
redhat/php-devel<5.3.3-22.el6
5.3.3-22.el6
redhat/php-imap<5.3.3-22.el6
5.3.3-22.el6
redhat/php-mbstring<5.3.3-22.el6
5.3.3-22.el6
redhat/php-process<5.3.3-22.el6
5.3.3-22.el6
redhat/openshift-origin-cartridge-jbosseap<6.0-1.0.4-1.el6
6.0-1.0.4-1.el6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203