<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for ruby19</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:1889-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-10-05T09:31:55Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-10-05T09:31:55Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-10-05T09:31:55Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for ruby19</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">ruby19 was updated to fix two security issues.

The following vulnerabilities were fixed:

* CVE-2015-1855: Ruby OpenSSL hostname verification was too permissive (bsc#926974).
* CVE-2009-5147: DL::dlopen could have loaded a library with tainted library name even if $SAFE &gt; 0 (bsc#939860).</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slestso13-ruby19-12180</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151889-1/</URL>
      <Description>Link for SUSE-SU-2015:1889-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-November/001661.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:1889-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/926974</URL>
      <Description>SUSE Bug 926974</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/939860</URL>
      <Description>SUSE Bug 939860</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-5147/</URL>
      <Description>SUSE CVE CVE-2009-5147 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-1855/</URL>
      <Description>SUSE CVE CVE-2015-1855 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Studio Onsite 1.3">
      <Branch Type="Product Name" Name="SUSE Studio Onsite 1.3">
        <FullProductName ProductID="SUSE Studio Onsite 1.3" CPE="cpe:/o:suse:sle-studioonsite:1.3">SUSE Studio Onsite 1.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby19-1.9.3.p392-0.23.1">
      <FullProductName ProductID="ruby19-1.9.3.p392-0.23.1">ruby19-1.9.3.p392-0.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby19-devel-1.9.3.p392-0.23.1">
      <FullProductName ProductID="ruby19-devel-1.9.3.p392-0.23.1">ruby19-devel-1.9.3.p392-0.23.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby19-devel-extra-1.9.3.p392-0.23.1">
      <FullProductName ProductID="ruby19-devel-extra-1.9.3.p392-0.23.1">ruby19-devel-extra-1.9.3.p392-0.23.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby19-1.9.3.p392-0.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite 1.3">
      <FullProductName ProductID="SUSE Studio Onsite 1.3:ruby19-1.9.3.p392-0.23.1">ruby19-1.9.3.p392-0.23.1 as a component of SUSE Studio Onsite 1.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby19-devel-1.9.3.p392-0.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite 1.3">
      <FullProductName ProductID="SUSE Studio Onsite 1.3:ruby19-devel-1.9.3.p392-0.23.1">ruby19-devel-1.9.3.p392-0.23.1 as a component of SUSE Studio Onsite 1.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby19-devel-extra-1.9.3.p392-0.23.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite 1.3">
      <FullProductName ProductID="SUSE Studio Onsite 1.3:ruby19-devel-extra-1.9.3.p392-0.23.1">ruby19-devel-extra-1.9.3.p392-0.23.1 as a component of SUSE Studio Onsite 1.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.</Note>
    </Notes>
    <CVE>CVE-2009-5147</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Studio Onsite 1.3:ruby19-1.9.3.p392-0.23.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:ruby19-devel-1.9.3.p392-0.23.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:ruby19-devel-extra-1.9.3.p392-0.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151889-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-5147.html</URL>
        <Description>CVE-2009-5147</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939860</URL>
        <Description>SUSE Bug 939860</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959495</URL>
        <Description>SUSE Bug 959495</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.</Note>
    </Notes>
    <CVE>CVE-2015-1855</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Studio Onsite 1.3:ruby19-1.9.3.p392-0.23.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:ruby19-devel-1.9.3.p392-0.23.1</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:ruby19-devel-extra-1.9.3.p392-0.23.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151889-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-1855.html</URL>
        <Description>CVE-2015-1855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/926974</URL>
        <Description>SUSE Bug 926974</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
