drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in ruby2.3
Name: |
Zwei Probleme in ruby2.3 |
|
ID: |
DSA-4332-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian stretch |
|
Datum: |
Sa, 3. November 2018, 14:52 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16395
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16396 |
|
Applikationen: |
Ruby |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-4332-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso November 03, 2018 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : ruby2.3 CVE ID : CVE-2018-16395 CVE-2018-16396
Several vulnerabilities have been discovered in the interpreter for the Ruby language. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2018-16395
Tyler Eckstein reported that the equality check of OpenSSL::X509::Name could return true for non-equal objects. If a malicious X.509 certificate is passed to compare with an existing certificate, there is a possibility to be judged incorrectly that they are equal.
CVE-2018-16396
Chris Seaton discovered that tainted flags are not propagated in Array#pack and String#unpack with some directives.
For the stable distribution (stretch), these problems have been fixed in version 2.3.3-1+deb9u4.
We recommend that you upgrade your ruby2.3 packages.
For the detailed security status of ruby2.3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby2.3
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlvddxtfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0T+Ww//bmL3sQ21jGprHqKM84o0GWsJjCAongfgntjfoKIQiKAo398hXgGCaRji d9CEIWzgAwDloy6uk6bWiVMYZyh6/5WmxsNAPpeLk9hPYzEJHWL2L9sxGJ05baPF cChPQQDzBITv8SpCNs+8tTvenDuUnJvPZVkAtm905wbCjEfLeSMiUsZ+Fy1g/Pgc xoAJdfSU+3s44AI69vLbggQ/8ZhYswlPp6meL6Fth2KWpbFqVepNkKpvEz6c0vTV UADysfdv7lRn8k95vBhXn3fyAASh+J7lJBRQqVU7r3W9g/PmAhdiqkcTAkF4ZhW5 RtU1LMxKr9aBQ3NSPkMYwB8BC5LdvyEUKrFsx1lzbaiYyWqz1QqQ0Qvo0f8Bo7kc ptsR8WjYFiSKcwnBDE7K2GmO/1xHpMurgTy438OuilWIhK2QaIThI/ee9wJu9Yn1 JeNSEZeGGhqZRKo46oOJkfIrxbm2tWXTsFPo2W3IzhYODTF1E3UrMmJmWKU4mRV0 r0CobRKQuRQC50soHBjmiNSzx+lP0cm7HXP7oAnkjL8vkh+DJ7C+7nGZzu0W+EXJ CA8LFekHIw4KvL3hpCELCaCH0Z+iGvjKeTfM2aKYH/csRIIhuCWmOxNOgwMBfJbC 11gZ53gILXdSvRran1ZlNA1A3Dq3GGKZF1ZB2FKsR/LejDCrnwA= =Goo2 -----END PGP SIGNATURE-----
|
|
|
|