-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4433-1 security@xxxxxxxxxx https://www.debian.org/security/ Moritz Muehlenhoff April 16, 2019 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ruby2.3 CVE ID : CVE-2019-8320 CVE-2019-8321 CVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325 Several vulnerabilities have been discovered in the Rubygems included in the interpreter for the Ruby language, which may result in denial of service or the execution of arbitrary code. For the stable distribution (stretch), these problems have been fixed in version 2.3.3-1+deb9u6. We recommend that you upgrade your ruby2.3 packages. For the detailed security status of ruby2.3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby2.3 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAly2QOsACgkQEMKTtsN8 TjbWKA//Tpk6aQgNerlaXxItbN6TOnTl5oIk0GeVOTDkZzC5tcW/82ZgmGLF3iq5 PzZnNvRsQulYfUgVCgxMs4YolM1Q7UFv4XvjalQ0F4w6CcZaSKg0HmstgmQ9fNDY ma+2cz6J6YJSypx4cs8E16gX1pJz177sDlJIsYMLb0YD3M9JyWOpw2UAf5OzWsrP 7Fzpkyg17BK9rp8iNyEKOTM9AUqRA9MOW9RDqObyBfIGcuE55oVyu3leT8CNwmnG Aw/FPia1qLS8FyE7K93qelDBGiqedaqUSe8JlS2Wq7cwdw0AwBYTEmSps5Y+bNiP ckUgtk1N1yckTKff1o/vBmEfF+zGVmcTfyRXgIDAs7PgbzmZifelWEscZN53wugy Nn148v2mARYoVvDrhr8aa6i77UlT/20A2pN1TIaFyMs4Sc806DYV5cb+eZJdXdrk qqOVrre5LVCZUTIRl3TXL8oMIzR6m1hXlDNYz+SXAWRtQVeX5vgkH4vnmRe/cbYu m/E2soKrGW8NDOkQMM8tDE8vjom10E7MOJYeB5I9zb1r2ZxBq/A3VQ3smCkob7jl Sl39MUOrtJX8G6o6qc0hoy5Fs9znNmXn7nkX3GXdbNUAccjQkQfUlg4Obi7cD4un /KajooKi8xwZ4Vtj35YPRroMfEOxeAUsHLpDySikGI8BnLB1B6E= =sSn/ -----END PGP SIGNATURE-----