<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for rubygem-activejob-5_1</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:3996-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-12-06T08:40:08Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-12-06T08:40:08Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-12-06T08:40:08Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for rubygem-activejob-5_1</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for rubygem-activejob-5_1 fixes the following issues:

Security issue fixed:

- CVE-2018-16476: Fixed broken access control vulnerability (bsc#1117632).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Module-Development-Tools-OBS-15-2018-2857,SUSE-SLE-Product-HA-15-2018-2857</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183996-1/</URL>
      <Description>Link for SUSE-SU-2018:3996-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-December/004926.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:3996-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1117632</URL>
      <Description>SUSE Bug 1117632</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16476/</URL>
      <Description>SUSE CVE CVE-2018-16476 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Availability Extension 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Availability Extension 15">
        <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15" CPE="cpe:/o:suse:sle-ha:15">SUSE Linux Enterprise High Availability Extension 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.5-rubygem-activejob-5_1-5.1.4-3.3.1">
      <FullProductName ProductID="ruby2.5-rubygem-activejob-5_1-5.1.4-3.3.1">ruby2.5-rubygem-activejob-5_1-5.1.4-3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="ruby2.5-rubygem-activejob-5_1-5.1.4-3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Availability Extension 15">
      <FullProductName ProductID="SUSE Linux Enterprise High Availability Extension 15:ruby2.5-rubygem-activejob-5_1-5.1.4-3.3.1">ruby2.5-rubygem-activejob-5_1-5.1.4-3.3.1 as a component of SUSE Linux Enterprise High Availability Extension 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Broken Access Control vulnerability in Active Job versions &gt;= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have. This vulnerability has been fixed in versions 4.2.11, 5.0.7.1, 5.1.6.1, and 5.2.1.1.</Note>
    </Notes>
    <CVE>CVE-2018-16476</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Availability Extension 15:ruby2.5-rubygem-activejob-5_1-5.1.4-3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183996-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16476.html</URL>
        <Description>CVE-2018-16476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1117632</URL>
        <Description>SUSE Bug 1117632</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1129268</URL>
        <Description>SUSE Bug 1129268</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
