<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for rubygem-actionpack-3_2, rubygem-activesupport-3_2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:0363-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-02-07T15:28:09Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-02-07T15:28:09Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-02-07T15:28:09Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for rubygem-actionpack-3_2, rubygem-activesupport-3_2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for rubygem-actionpack-3_2, rubygem-activesupport-3_2 fixes the following issues:

- CVE-2015-7576: Timing attack vulnerability in basic authentication in Action Controller (boo#963329)
- CVE-2016-0752: directory traversal and information leak in Action View (boo#963332)
- CVE-2016-0751: rubygem-actionpack: Object Leak DoS (boo#963331)
- CVE-2015-7577: Nested attributes rejection proc bypass (boo#963330)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:0363-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-actionpack-3_2-3.2.17-3.7.1">
      <FullProductName ProductID="rubygem-actionpack-3_2-3.2.17-3.7.1">rubygem-actionpack-3_2-3.2.17-3.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-actionpack-3_2-doc-3.2.17-3.7.1">
      <FullProductName ProductID="rubygem-actionpack-3_2-doc-3.2.17-3.7.1">rubygem-actionpack-3_2-doc-3.2.17-3.7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activerecord-3_2-3.2.17-3.3.1">
      <FullProductName ProductID="rubygem-activerecord-3_2-3.2.17-3.3.1">rubygem-activerecord-3_2-3.2.17-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activerecord-3_2-doc-3.2.17-3.3.1">
      <FullProductName ProductID="rubygem-activerecord-3_2-doc-3.2.17-3.3.1">rubygem-activerecord-3_2-doc-3.2.17-3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activesupport-3_2-3.2.17-2.6.1">
      <FullProductName ProductID="rubygem-activesupport-3_2-3.2.17-2.6.1">rubygem-activesupport-3_2-3.2.17-2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activesupport-3_2-doc-3.2.17-2.6.1">
      <FullProductName ProductID="rubygem-activesupport-3_2-doc-3.2.17-2.6.1">rubygem-activesupport-3_2-doc-3.2.17-2.6.1</FullProductName>
    </Branch>
    <Relationship ProductReference="rubygem-actionpack-3_2-3.2.17-3.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:rubygem-actionpack-3_2-3.2.17-3.7.1">rubygem-actionpack-3_2-3.2.17-3.7.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-actionpack-3_2-doc-3.2.17-3.7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:rubygem-actionpack-3_2-doc-3.2.17-3.7.1">rubygem-actionpack-3_2-doc-3.2.17-3.7.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activerecord-3_2-3.2.17-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:rubygem-activerecord-3_2-3.2.17-3.3.1">rubygem-activerecord-3_2-3.2.17-3.3.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activerecord-3_2-doc-3.2.17-3.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:rubygem-activerecord-3_2-doc-3.2.17-3.3.1">rubygem-activerecord-3_2-doc-3.2.17-3.3.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activesupport-3_2-3.2.17-2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:rubygem-activesupport-3_2-3.2.17-2.6.1">rubygem-activesupport-3_2-3.2.17-2.6.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activesupport-3_2-doc-3.2.17-2.6.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:rubygem-activesupport-3_2-doc-3.2.17-2.6.1">rubygem-activesupport-3_2-doc-3.2.17-2.6.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.</Note>
    </Notes>
    <CVE>CVE-2015-7576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-3.2.17-3.7.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-doc-3.2.17-3.7.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activerecord-3_2-3.2.17-3.3.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activerecord-3_2-doc-3.2.17-3.3.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activesupport-3_2-3.2.17-2.6.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activesupport-3_2-doc-3.2.17-2.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7576.html</URL>
        <Description>CVE-2015-7576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963329</URL>
        <Description>SUSE Bug 963329</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970715</URL>
        <Description>SUSE Bug 970715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.</Note>
    </Notes>
    <CVE>CVE-2015-7577</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-3.2.17-3.7.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-doc-3.2.17-3.7.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activerecord-3_2-3.2.17-3.3.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activerecord-3_2-doc-3.2.17-3.3.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activesupport-3_2-3.2.17-2.6.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activesupport-3_2-doc-3.2.17-2.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7577.html</URL>
        <Description>CVE-2015-7577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963330</URL>
        <Description>SUSE Bug 963330</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.</Note>
    </Notes>
    <CVE>CVE-2016-0751</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-3.2.17-3.7.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-doc-3.2.17-3.7.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activerecord-3_2-3.2.17-3.3.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activerecord-3_2-doc-3.2.17-3.3.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activesupport-3_2-3.2.17-2.6.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activesupport-3_2-doc-3.2.17-2.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0751.html</URL>
        <Description>CVE-2016-0751</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963331</URL>
        <Description>SUSE Bug 963331</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.</Note>
    </Notes>
    <CVE>CVE-2016-0752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-3.2.17-3.7.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-doc-3.2.17-3.7.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activerecord-3_2-3.2.17-3.3.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activerecord-3_2-doc-3.2.17-3.3.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activesupport-3_2-3.2.17-2.6.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-activesupport-3_2-doc-3.2.17-2.6.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-0752.html</URL>
        <Description>CVE-2016-0752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963332</URL>
        <Description>SUSE Bug 963332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968850</URL>
        <Description>SUSE Bug 968850</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
