<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for rubygem-activesupport-3_2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:0047-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-01-07T12:54:36Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-01-07T12:54:36Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-01-07T12:54:36Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for rubygem-activesupport-3_2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">rubygem-activesupport-3_2 was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-3227: Possible Denial of Service attack in Active Support (bsc#934800).
  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp3-rubygem-activesupport-3_2-12304,sdksp4-rubygem-activesupport-3_2-12304,sleslms13-rubygem-activesupport-3_2-12304,slestso13-rubygem-activesupport-3_2-12304,slewyst13-rubygem-activesupport-3_2-12304</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160047-1/</URL>
      <Description>Link for SUSE-SU-2016:0047-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2016-January/001787.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:0047-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/934800</URL>
      <Description>SUSE Bug 934800</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3227/</URL>
      <Description>SUSE CVE CVE-2015-3227 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Lifecycle Management Server 1.3">
      <Branch Type="Product Name" Name="SUSE Lifecycle Management Server 1.3">
        <FullProductName ProductID="SUSE Lifecycle Management Server 1.3" CPE="cpe:/a:suse:sle-slms:1.3">SUSE Lifecycle Management Server 1.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3" CPE="cpe:/a:suse:sle-sdk:11:sp3">SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4" CPE="cpe:/a:suse:sle-sdk:11:sp4">SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Studio Onsite 1.3">
      <Branch Type="Product Name" Name="SUSE Studio Onsite 1.3">
        <FullProductName ProductID="SUSE Studio Onsite 1.3" CPE="cpe:/o:suse:sle-studioonsite:1.3">SUSE Studio Onsite 1.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE WebYast 1.3">
      <Branch Type="Product Name" Name="SUSE WebYast 1.3">
        <FullProductName ProductID="SUSE WebYast 1.3" CPE="cpe:/o:suse:webyast:1.3">SUSE WebYast 1.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activesupport-3_2-3.2.12-0.14.3">
      <FullProductName ProductID="rubygem-activesupport-3_2-3.2.12-0.14.3">rubygem-activesupport-3_2-3.2.12-0.14.3</FullProductName>
    </Branch>
    <Relationship ProductReference="rubygem-activesupport-3_2-3.2.12-0.14.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Lifecycle Management Server 1.3">
      <FullProductName ProductID="SUSE Lifecycle Management Server 1.3:rubygem-activesupport-3_2-3.2.12-0.14.3">rubygem-activesupport-3_2-3.2.12-0.14.3 as a component of SUSE Lifecycle Management Server 1.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activesupport-3_2-3.2.12-0.14.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3:rubygem-activesupport-3_2-3.2.12-0.14.3">rubygem-activesupport-3_2-3.2.12-0.14.3 as a component of SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activesupport-3_2-3.2.12-0.14.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-activesupport-3_2-3.2.12-0.14.3">rubygem-activesupport-3_2-3.2.12-0.14.3 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activesupport-3_2-3.2.12-0.14.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite 1.3">
      <FullProductName ProductID="SUSE Studio Onsite 1.3:rubygem-activesupport-3_2-3.2.12-0.14.3">rubygem-activesupport-3_2-3.2.12-0.14.3 as a component of SUSE Studio Onsite 1.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activesupport-3_2-3.2.12-0.14.3" RelationType="Default Component Of" RelatesToProductReference="SUSE WebYast 1.3">
      <FullProductName ProductID="SUSE WebYast 1.3:rubygem-activesupport-3_2-3.2.12-0.14.3">rubygem-activesupport-3_2-3.2.12-0.14.3 as a component of SUSE WebYast 1.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.</Note>
    </Notes>
    <CVE>CVE-2015-3227</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Lifecycle Management Server 1.3:rubygem-activesupport-3_2-3.2.12-0.14.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:rubygem-activesupport-3_2-3.2.12-0.14.3</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-activesupport-3_2-3.2.12-0.14.3</ProductID>
        <ProductID>SUSE Studio Onsite 1.3:rubygem-activesupport-3_2-3.2.12-0.14.3</ProductID>
        <ProductID>SUSE WebYast 1.3:rubygem-activesupport-3_2-3.2.12-0.14.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160047-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3227.html</URL>
        <Description>CVE-2015-3227</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934800</URL>
        <Description>SUSE Bug 934800</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
