{"affected":[{"ecosystem_specific":{"binaries":[{"ruby2.1-rubygem-actionpack-4_1":"4.1.9-9.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 5","name":"rubygem-actionpack-4_1","purl":"pkg:rpm/suse/rubygem-actionpack-4_1&distro=SUSE%20OpenStack%20Cloud%205"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.1.9-9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for rubygem-actionpack-4_1 fixes the following issues:\n\n- CVE-2016-0751: Object Leak DoS (bsc#963331)\n- CVE-2015-7581: unbounded memory growth DoS via wildcard controller routes (bsc#963335) \n- CVE-2016-0752: directory traversal and information leak in Action View (bsc#963332) \n- CVE-2015-7576: Timing attack vulnerability in basic authentication in Action Controller (bsc#963329)\n","id":"SUSE-SU-2016:0858-1","modified":"2016-03-22T16:21:44Z","published":"2016-03-22T16:21:44Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20160858-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/963329"},{"type":"REPORT","url":"https://bugzilla.suse.com/963331"},{"type":"REPORT","url":"https://bugzilla.suse.com/963332"},{"type":"REPORT","url":"https://bugzilla.suse.com/963335"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-7576"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-7581"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0751"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0752"}],"related":["CVE-2015-7576","CVE-2015-7581","CVE-2016-0751","CVE-2016-0752"],"summary":"Security update for rubygem-actionpack-4_1","upstream":["CVE-2015-7576","CVE-2015-7581","CVE-2016-0751","CVE-2016-0752"]}