File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1+ ---
2+ engine : ruby
3+ cve : 2018-16395
4+ url : https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/
5+ title : Incorrect equality check in OpenSSL::X509::Name
6+ date : 2018-10-17
7+ description : |
8+ The equality check of `OpenSSL::X509::Name` is not correctly in openssl
9+ extension library bundled with Ruby.
10+
11+ An instance of `OpenSSL::X509::Name` contains entities such as `CN`, `C`
12+ and so on. Some two instances of `OpenSSL::X509::Name` are equal only when
13+ all entities are exactly equal. However, there is a bug that the equality
14+ check is not correct if the value of an entity of the argument (right-hand
15+ side) starts with the value of the receiver (left-hand side). So, if a
16+ malicious X.509 certificate is passed to compare with an existing
17+ certificate, there is a possibility to be judged incorrectly that they are
18+ equal.
19+
20+ It is strongly recommended for Ruby users to upgrade your Ruby installation
21+ or take one of the following workarounds as soon as possible.
22+
23+ `openssl` gem 2.1.2 or later includes the fix for the vulnerability, so
24+ upgrade `openssl` gem to the latest version if you are using Ruby 2.4 or
25+ later series.
26+
27+ `gem install openssl -v ">= 2.1.2"`
28+
29+ However, in Ruby 2.3 series, you cannot override bundled version of openssl
30+ with `openssl` gem. Please upgrade your Ruby installation to the latest
31+ version.
32+ patched_versions :
33+ - " ~> 2.3.8"
34+ - " ~> 2.4.5"
35+ - " ~> 2.5.2"
You can’t perform that action at this time.
0 commit comments