<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for rubygem-actionpack-3_2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:0835-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-03-19T11:57:28Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-03-19T11:57:28Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-03-19T11:57:28Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for rubygem-actionpack-3_2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for rubygem-actionpack-3_2 fixes the following issues:

- CVE-2016-2097: rubygem-actionview: Possible Information
  Leak Vulnerability in Action View. (boo#968850)

- CVE-2016-2098: rubygem-actionpack: Possible remote
  code execution vulnerability in Action Pack (boo#968849)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:0835-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-actionpack-3_2-3.2.17-3.10.1">
      <FullProductName ProductID="rubygem-actionpack-3_2-3.2.17-3.10.1">rubygem-actionpack-3_2-3.2.17-3.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-actionpack-3_2-doc-3.2.17-3.10.1">
      <FullProductName ProductID="rubygem-actionpack-3_2-doc-3.2.17-3.10.1">rubygem-actionpack-3_2-doc-3.2.17-3.10.1</FullProductName>
    </Branch>
    <Relationship ProductReference="rubygem-actionpack-3_2-3.2.17-3.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:rubygem-actionpack-3_2-3.2.17-3.10.1">rubygem-actionpack-3_2-3.2.17-3.10.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-actionpack-3_2-doc-3.2.17-3.10.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:rubygem-actionpack-3_2-doc-3.2.17-3.10.1">rubygem-actionpack-3_2-doc-3.2.17-3.10.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.</Note>
    </Notes>
    <CVE>CVE-2016-2097</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-3.2.17-3.10.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-doc-3.2.17-3.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2097.html</URL>
        <Description>CVE-2016-2097</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963332</URL>
        <Description>SUSE Bug 963332</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968850</URL>
        <Description>SUSE Bug 968850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.</Note>
    </Notes>
    <CVE>CVE-2016-2098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-3.2.17-3.10.1</ProductID>
        <ProductID>openSUSE 13.2:rubygem-actionpack-3_2-doc-3.2.17-3.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2098.html</URL>
        <Description>CVE-2016-2098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968849</URL>
        <Description>SUSE Bug 968849</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
