Skip to content

Commit d924dba

Browse files
transoceanic2000reedloden
authored andcommitted
1 parent b00486f commit d924dba

1 file changed

Lines changed: 35 additions & 0 deletions

File tree

rubies/ruby/CVE-2018-16395.yml

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
engine: ruby
3+
cve: 2018-16395
4+
url: https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/
5+
title: Incorrect equality check in OpenSSL::X509::Name
6+
date: 2018-10-17
7+
description: |
8+
The equality check of `OpenSSL::X509::Name` is not correctly in openssl
9+
extension library bundled with Ruby.
10+
11+
An instance of `OpenSSL::X509::Name` contains entities such as `CN`, `C`
12+
and so on. Some two instances of `OpenSSL::X509::Name` are equal only when
13+
all entities are exactly equal. However, there is a bug that the equality
14+
check is not correct if the value of an entity of the argument (right-hand
15+
side) starts with the value of the receiver (left-hand side). So, if a
16+
malicious X.509 certificate is passed to compare with an existing
17+
certificate, there is a possibility to be judged incorrectly that they are
18+
equal.
19+
20+
It is strongly recommended for Ruby users to upgrade your Ruby installation
21+
or take one of the following workarounds as soon as possible.
22+
23+
`openssl` gem 2.1.2 or later includes the fix for the vulnerability, so
24+
upgrade `openssl` gem to the latest version if you are using Ruby 2.4 or
25+
later series.
26+
27+
`gem install openssl -v ">= 2.1.2"`
28+
29+
However, in Ruby 2.3 series, you cannot override bundled version of openssl
30+
with `openssl` gem. Please upgrade your Ruby installation to the latest
31+
version.
32+
patched_versions:
33+
- "~> 2.3.8"
34+
- "~> 2.4.5"
35+
- "~> 2.5.2"

0 commit comments

Comments
 (0)