Salvatore,

* Salvatore Bonaccorso <car...@debian.org> [150627 13:57]:
> Source: ruby2.1
> Version: 2.1.5-1
> Severity: important
> Tags: security upstream patch fixed-upstream
> 
> the following vulnerability was published for ruby2.1.
> 
> CVE-2015-3900[0]:
> | RubyGems 2.0.x before 2.0.16, 2.2.x before 2.2.4, and 2.4.x before
> | 2.4.7 does not validate the hostname when fetching gems or making API
> | request, which allows remote attackers to redirect requests to
> | arbitrary domains via a crafted DNS SRV record, aka a "DNS hijack
> | attack."

Thank you for bringing this to our attention. I suspect upstream
will upgrade to 2.2.5 (on the ruby 2.1 branch) in the next few days,
and then I'd like to import that, if nobody objects.

Best,
-- 
 ,''`.  Christian Hofstaedtler <z...@debian.org>
: :' :  Debian Developer
`. `'   7D1A CFFA D9E0 806C 9C4C  D392 5C13 D6DB 9305 2E03
  `-

Attachment: pgphuy6nw0CY5.pgp
Description: PGP signature

Reply via email to