{"affected":[{"ecosystem_specific":{"binaries":[{"ruby2.5-rubygem-rack":"2.0.8-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 15","name":"rubygem-rack","purl":"pkg:rpm/suse/rubygem-rack&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.8-3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"ruby2.5-rubygem-rack":"2.0.8-3.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Availability Extension 15 SP1","name":"rubygem-rack","purl":"pkg:rpm/suse/rubygem-rack&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.0.8-3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for rubygem-rack to version 2.0.8 fixes the following issues:\n\n- CVE-2018-16471: Fixed a cross-site scripting (XSS) flaw via the scheme method on Rack::Request (bsc#1116600).\n- CVE-2019-16782: Fixed a possible information leak and session hijack vulnerability (bsc#1159548).\n","id":"SUSE-SU-2020:0359-1","modified":"2020-02-07T09:40:05Z","published":"2020-02-07T09:40:05Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20200359-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1114828"},{"type":"REPORT","url":"https://bugzilla.suse.com/1116600"},{"type":"REPORT","url":"https://bugzilla.suse.com/1159548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2018-16471"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-16782"}],"related":["CVE-2018-16471","CVE-2019-16782"],"summary":"Security update for rubygem-rack","upstream":["CVE-2018-16471","CVE-2019-16782"]}