-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3245-1 security@xxxxxxxxxx http://www.debian.org/security/ Alessandro Ghedini May 02, 2015 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ruby1.8 CVE ID : CVE-2015-1855 It was discovered that the Ruby OpenSSL extension, part of the interpreter for the Ruby language, did not properly implement hostname matching, in violation of RFC 6125. This could allow remote attackers to perform a man-in-the-middle attack via crafted SSL certificates. For the oldstable distribution (wheezy), this problem has been fixed in version 1.8.7.358-7.1+deb7u3. We recommend that you upgrade your ruby1.8 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVRLLDAAoJEK+lG9bN5XPL7dYP/3uTBvPcDxofqR6LY+irPfV/ 2Ers/xj4Y8v68P5ZoRt5L7gFtJHCVPqw4yDt9az/P1nrd8dOyWtgxT2STCDK88T5 2TWyfpKxJEcWAKtpGGViVe2CvdbWrqp0K3Q/aO86FuYETUyg5vqP6xSru72ZTE/d 4sXm+CwpKvfW/nQrp2gt3UBJjEHSKVxmuDfkcIFjiLkY/+2p8ADUnwYH3bFSEUey wtyEHwCVUvdUqWbLURHEsNRsvXTKfDMk9UhyMlY5ius81DGTr+u+0ZtekK1eBOqj G8dJja0yTEfDE6nrqjwgRP7jNV4c05rRgYnjfN0Sd2R8i4hYNPKaDFGWMiHLhz0N BwcFDpnlfmi2qtpG7SM2vHTEEXzr+T7328Za+dfchL3HpFjJ2BuYfMtkszdwGDsz zNYDJUeOqok+BuWndzViJ/63BVdEtE/8sUT6Dhv7Jd2tHT8aIDu/vVXT2YQ3R7eY THUZwpS+zJw3HSuK9dGgp6cXfvzx+IvYdtXCCzUInIhLZVb5KE0PWM8WCqOpy9eS g0Pl+RFASzVwPKx1F3G3CoitKUlUJxc4iCLR+qq5R1pfLp8QrCMJz403iuliEon/ jHhcRI4XnMr4IT81VDOxPKCDNe+MI1OridV0a8hSEkoM8os97nTfq0NqvYPQ84IJ jr8ZU/B4aYzACroolkp3 =Yb/c -----END PGP SIGNATURE-----