<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10332</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10332</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-4671/</URL>
      <Description>SUSE CVE CVE-2014-4671 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-7818/</URL>
      <Description>SUSE CVE CVE-2014-7818 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-7829/</URL>
      <Description>SUSE CVE CVE-2014-7829 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2098/</URL>
      <Description>SUSE CVE CVE-2016-2098 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1">
      <FullProductName ProductID="ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1">ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1">
      <FullProductName ProductID="ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1">ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1">
      <FullProductName ProductID="ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1">ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1">
      <FullProductName ProductID="ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1">ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1">
      <FullProductName ProductID="ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1">ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1">
      <FullProductName ProductID="ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1">ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1">
      <FullProductName ProductID="ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1">ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1">
      <FullProductName ProductID="ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1">ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1">ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1">ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1">ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1">ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1">ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1">ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1">ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1">ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Adobe Flash Player before 13.0.0.231 and 14.x before 14.0.0.145 on Windows and OS X and before 11.2.202.394 on Linux, Adobe AIR before 14.0.0.137 on Android, Adobe AIR SDK before 14.0.0.137, and Adobe AIR SDK &amp; Compiler before 14.0.0.137 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.</Note>
    </Notes>
    <CVE>CVE-2014-4671</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4671.html</URL>
        <Description>CVE-2014-4671</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/886454</URL>
        <Description>SUSE Bug 886454</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/891688</URL>
        <Description>SUSE Bug 891688</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.</Note>
    </Notes>
    <CVE>CVE-2014-7818</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-7818.html</URL>
        <Description>CVE-2014-7818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/903662</URL>
        <Description>SUSE Bug 903662</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905727</URL>
        <Description>SUSE Bug 905727</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.</Note>
    </Notes>
    <CVE>CVE-2014-7829</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-7829.html</URL>
        <Description>CVE-2014-7829</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905727</URL>
        <Description>SUSE Bug 905727</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.</Note>
    </Notes>
    <CVE>CVE-2016-2098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-doc-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.2-rubygem-actionpack-doc-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-5_0-5.0.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-doc-4_2-4.2.7.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:ruby2.3-rubygem-actionpack-doc-5_0-5.0.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2098.html</URL>
        <Description>CVE-2016-2098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968849</URL>
        <Description>SUSE Bug 968849</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969943</URL>
        <Description>SUSE Bug 969943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/993313</URL>
        <Description>SUSE Bug 993313</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
