lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 03 Nov 2018 10:24:23 +0000 From: Salvatore Bonaccorso <carnil@...ian.org> To: bugtraq@...urityfocus.com Subject: [SECURITY] [DSA 4332-1] ruby2.3 security update -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-4332-1 security@...ian.org https://www.debian.org/security/ Salvatore Bonaccorso November 03, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ruby2.3 CVE ID : CVE-2018-16395 CVE-2018-16396 Several vulnerabilities have been discovered in the interpreter for the Ruby language. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2018-16395 Tyler Eckstein reported that the equality check of OpenSSL::X509::Name could return true for non-equal objects. If a malicious X.509 certificate is passed to compare with an existing certificate, there is a possibility to be judged incorrectly that they are equal. CVE-2018-16396 Chris Seaton discovered that tainted flags are not propagated in Array#pack and String#unpack with some directives. For the stable distribution (stretch), these problems have been fixed in version 2.3.3-1+deb9u4. We recommend that you upgrade your ruby2.3 packages. For the detailed security status of ruby2.3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby2.3 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@...ts.debian.org -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlvddxtfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0T+Ww//bmL3sQ21jGprHqKM84o0GWsJjCAongfgntjfoKIQiKAo398hXgGCaRji d9CEIWzgAwDloy6uk6bWiVMYZyh6/5WmxsNAPpeLk9hPYzEJHWL2L9sxGJ05baPF cChPQQDzBITv8SpCNs+8tTvenDuUnJvPZVkAtm905wbCjEfLeSMiUsZ+Fy1g/Pgc xoAJdfSU+3s44AI69vLbggQ/8ZhYswlPp6meL6Fth2KWpbFqVepNkKpvEz6c0vTV UADysfdv7lRn8k95vBhXn3fyAASh+J7lJBRQqVU7r3W9g/PmAhdiqkcTAkF4ZhW5 RtU1LMxKr9aBQ3NSPkMYwB8BC5LdvyEUKrFsx1lzbaiYyWqz1QqQ0Qvo0f8Bo7kc ptsR8WjYFiSKcwnBDE7K2GmO/1xHpMurgTy438OuilWIhK2QaIThI/ee9wJu9Yn1 JeNSEZeGGhqZRKo46oOJkfIrxbm2tWXTsFPo2W3IzhYODTF1E3UrMmJmWKU4mRV0 r0CobRKQuRQC50soHBjmiNSzx+lP0cm7HXP7oAnkjL8vkh+DJ7C+7nGZzu0W+EXJ CA8LFekHIw4KvL3hpCELCaCH0Z+iGvjKeTfM2aKYH/csRIIhuCWmOxNOgwMBfJbC 11gZ53gILXdSvRran1ZlNA1A3Dq3GGKZF1ZB2FKsR/LejDCrnwA= =Goo2 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists