Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.70187
Category:Fedora Local Security Checks
Title:Fedora Core 16 FEDORA-2011-11386 (rubygem-activesupport)
Summary:NOSUMMARY
Description:Description:
The remote host is missing an update to rubygem-activesupport
announced via advisory FEDORA-2011-11386.

Update Information:

Update to Rails 3.0.10 which fixes several security bugs.

References:

[ 1 ] Bug #731436 - CVE-2011-2931 rubygem-actionpack: XSS vulnerability in strip_tags helper (Ruby on Rails)
https://bugzilla.redhat.com/show_bug.cgi?id=731436
[ 2 ] Bug #731432 - CVE-2011-2929 rubygem-actionpack: filter skipping vulnerability (Ruby on Rails)
https://bugzilla.redhat.com/show_bug.cgi?id=731432
[ 3 ] Bug #731438 - CVE-2011-2930 rubygem-activerecord: SQL injection vulnerability in quote_table_name (Ruby on Rails)
https://bugzilla.redhat.com/show_bug.cgi?id=731438
[ 4 ] Bug #731435 - CVE-2011-2932 rubygem-activesupport: XSS vulnerability in escaping function (Ruby on Rails)
https://bugzilla.redhat.com/show_bug.cgi?id=731435

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update rubygem-activesupport' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2011-11386

Risk factor : High

CVSS Score:
7.5

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-2931
Debian Security Information: DSA-2301 (Google Search)
http://www.debian.org/security/2011/dsa-2301
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html
http://www.openwall.com/lists/oss-security/2011/08/17/1
http://www.openwall.com/lists/oss-security/2011/08/19/11
http://www.openwall.com/lists/oss-security/2011/08/20/1
http://www.openwall.com/lists/oss-security/2011/08/22/13
http://www.openwall.com/lists/oss-security/2011/08/22/14
http://www.openwall.com/lists/oss-security/2011/08/22/5
http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source&output=gplain
http://secunia.com/advisories/45921
Common Vulnerability Exposure (CVE) ID: CVE-2011-2929
http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain
Common Vulnerability Exposure (CVE) ID: CVE-2011-2930
http://groups.google.com/group/rubyonrails-security/msg/b1a85d36b0f9dd30?dmode=source&output=gplain
Common Vulnerability Exposure (CVE) ID: CVE-2011-2932
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html
http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplain
http://secunia.com/advisories/45917
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.