|Category:||Debian Local Security Checks|
|Title:||Debian LTS Advisory ([SECURITY] [DLA 1558-1] ruby2.1 security update)|
|Summary:||CVE-2018-16395;Fix for OpenSSL::X509::Name equality check.;;CVE-2018-16396;Tainted flags are not propagated in Array#pack and String#unpack;with some directives.|
Fix for OpenSSL::X509::Name equality check.
Tainted flags are not propagated in Array#pack and String#unpack
with some directives.
Ruby is the interpreted scripting language for quick and easy
object-oriented programming. It has many features to process text
files and to do system management tasks (as in perl). It is simple,
straight-forward, and extensible.
ruby2.1 on Debian Linux
For Debian 8 'Jessie', these problems have been fixed in version
We recommend that you upgrade your ruby2.1 packages.
Common Vulnerability Exposure (CVE) ID: CVE-2018-16395|
Common Vulnerability Exposure (CVE) ID: CVE-2018-16396
|Copyright||Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 71225 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.