[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2018-1113 --- ruby23 rubygem23 rubygems23

ID: oval:org.secpod.oval:def:1600956Date: (C)2018-12-11   (M)2022-08-23
Class: PATCHFamily: unix




An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.

Platform:
Amazon Linux AMI
Product:
ruby23
rubygem23
rubygems23
Reference:
ALAS-2018-1113
CVE-2018-16396
CVE-2018-16395
CVE    2
CVE-2018-16396
CVE-2018-16395
CPE    4
cpe:/a:ruby:ruby23
cpe:/o:amazon:linux
cpe:/a:ruby:rubygems23
cpe:/a:ruby:rubygem23
...

© SecPod Technologies