First published: Fri Nov 29 2019(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ruby1.8 | ||
debian/ruby1.9.1 | ||
debian/ruby2.0 | ||
Ruby | >=2.1.0<2.1.6 | |
Ruby | >=2.2.0<2.2.2 | |
Ruby | =2.0.0 | |
Ruby | =2.0.0-p0 | |
Ruby | =2.0.0-p195 | |
Ruby | =2.0.0-p247 | |
Ruby | =2.0.0-p353 | |
Ruby | =2.0.0-p451 | |
Ruby | =2.0.0-p481 | |
Ruby | =2.0.0-p576 | |
Ruby | =2.0.0-p594 | |
Ruby | =2.0.0-p598 | |
Ruby | =2.0.0-p643 | |
Ruby trunk | <50292 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
Puppet | =1.0.0 | |
Puppetlabs Puppet Enterprise | >=3.0.0<3.8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1855 is a vulnerability classified as high severity due to its potential to allow remote attackers to spoof servers.
To fix CVE-2015-1855, update your Ruby installation to version 2.0.0 patchlevel 645 or later, or version 2.1.6 or later, or version 2.2.2 or later.
CVE-2015-1855 affects Ruby versions prior to 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2.
CVE-2015-1855 allows attackers to spoof server identities, potentially leading to man-in-the-middle attacks on web applications.
Yes, CVE-2015-1855 is present in the Ruby packages included in Debian systems, specifically in the affected Ruby versions listed.