-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4332-1 security@xxxxxxxxxx https://www.debian.org/security/ Salvatore Bonaccorso November 03, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ruby2.3 CVE ID : CVE-2018-16395 CVE-2018-16396 Several vulnerabilities have been discovered in the interpreter for the Ruby language. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2018-16395 Tyler Eckstein reported that the equality check of OpenSSL::X509::Name could return true for non-equal objects. If a malicious X.509 certificate is passed to compare with an existing certificate, there is a possibility to be judged incorrectly that they are equal. CVE-2018-16396 Chris Seaton discovered that tainted flags are not propagated in Array#pack and String#unpack with some directives. For the stable distribution (stretch), these problems have been fixed in version 2.3.3-1+deb9u4. We recommend that you upgrade your ruby2.3 packages. For the detailed security status of ruby2.3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby2.3 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlvddxtfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0T+Ww//bmL3sQ21jGprHqKM84o0GWsJjCAongfgntjfoKIQiKAo398hXgGCaRji d9CEIWzgAwDloy6uk6bWiVMYZyh6/5WmxsNAPpeLk9hPYzEJHWL2L9sxGJ05baPF cChPQQDzBITv8SpCNs+8tTvenDuUnJvPZVkAtm905wbCjEfLeSMiUsZ+Fy1g/Pgc xoAJdfSU+3s44AI69vLbggQ/8ZhYswlPp6meL6Fth2KWpbFqVepNkKpvEz6c0vTV UADysfdv7lRn8k95vBhXn3fyAASh+J7lJBRQqVU7r3W9g/PmAhdiqkcTAkF4ZhW5 RtU1LMxKr9aBQ3NSPkMYwB8BC5LdvyEUKrFsx1lzbaiYyWqz1QqQ0Qvo0f8Bo7kc ptsR8WjYFiSKcwnBDE7K2GmO/1xHpMurgTy438OuilWIhK2QaIThI/ee9wJu9Yn1 JeNSEZeGGhqZRKo46oOJkfIrxbm2tWXTsFPo2W3IzhYODTF1E3UrMmJmWKU4mRV0 r0CobRKQuRQC50soHBjmiNSzx+lP0cm7HXP7oAnkjL8vkh+DJ7C+7nGZzu0W+EXJ CA8LFekHIw4KvL3hpCELCaCH0Z+iGvjKeTfM2aKYH/csRIIhuCWmOxNOgwMBfJbC 11gZ53gILXdSvRran1ZlNA1A3Dq3GGKZF1ZB2FKsR/LejDCrnwA= =Goo2 -----END PGP SIGNATURE-----