Source: ruby-openssl
Version: 2.1.1-1
Severity: grave
Tags: patch security upstream
Justification: user security hole
Control: clone -1 -2
Control: retitle -2 ruby2.5: CVE-2018-16395: OpenSSL::X509::Name equality check 
does not work correctly
Control: reassign -2 ruby2.5 2.5.1-6

Hi,

The following vulnerability was published for ruby-openssl.

CVE-2018-16395[0]:
OpenSSL::X509::Name equality check does not work correctly

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2018-16395
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16395
[1] 
https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/

Regards,
Salvatore

Reply via email to