[SECURITY] [DLA 2007-1] ruby2.1 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Package : ruby2.1
Version : 2.1.5-2+deb8u8
CVE ID : CVE-2019-15845 CVE-2019-16201 CVE-2019-16254
CVE-2019-16255
Several flaws have been found in ruby2.1, an interpreter of an
object-oriented scripting language.
CVE-2019-15845
Path matching might pass in File.fnmatch and File.fnmatch? due
to a NUL character injection.
CVE-2019-16201
A loop caused by a wrong regular expression could lead to a denial
of service of a WEBrick service.
CVE-2019-16254
This is the same issue as CVE-2017-17742, whose fix was not complete.
CVE-2019-16255
Giving untrusted data to the first argument of Shell#[] and
Shell#test might lead to a code injection vulnerability.
For Debian 8 "Jessie", these problems have been fixed in version
2.1.5-2+deb8u8.
We recommend that you upgrade your ruby2.1 packages.
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=df4E
-----END PGP SIGNATURE-----
Reply to: