Home / vulnerabilities Debian Security Advisory 3247-1
Posted on 05 May 2015
Source : packetstormsecurity.org Link
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3247-1 security@debian.org
http://www.debian.org/security/ Alessandro Ghedini
May 02, 2015 http://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : ruby2.1
CVE ID : CVE-2015-1855
It was discovered that the Ruby OpenSSL extension, part of the interpreter
for the Ruby language, did not properly implement hostname matching, in
violation of RFC 6125. This could allow remote attackers to perform a
man-in-the-middle attack via crafted SSL certificates.
For the stable distribution (jessie), this problem has been fixed in
version 2.1.5-2+deb8u1.
For the testing distribution (stretch), this problem has been fixed in
version 2.1.5-3.
For the unstable distribution (sid), this problem has been fixed in
version 2.1.5-3.
We recommend that you upgrade your ruby2.1 packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=U0Py
-----END PGP SIGNATURE-----