Source: ruby-openssl Version: 2.1.1-1 Severity: grave Tags: patch security upstream Justification: user security hole Control: clone -1 -2 Control: retitle -2 ruby2.5: CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly Control: reassign -2 ruby2.5 2.5.1-6
Hi, The following vulnerability was published for ruby-openssl. CVE-2018-16395[0]: OpenSSL::X509::Name equality check does not work correctly If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2018-16395 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16395 [1] https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/ Regards, Salvatore