Red Hat Bugzilla – Bug 1643086
CVE-2018-16395 ruby: OpenSSL::X509::Name equality check does not work correctly
Last modified: 2018-10-26 16:00:16 EDT
An instance of OpenSSL::X509::Name contains entities such as CN, C and so on. Some two instances of OpenSSL::X509::Name are equal only when all entities are exactly equal. However, there is a bug that the equality check is not correct if the value of an entity of the argument (right-hand side) starts with the value of the receiver (left-hand side). So, if a malicious X.509 certificate is passed to compare with an existing certificate, there is a possibility to be judged incorrectly that they are equal. External References: https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/
Created ruby tracking bugs for this issue: Affects: fedora-all [bug 1643091]
Upstream patch: https://github.com/ruby/openssl/commit/f653cfa43f0f20e8c440122ea982382b6228e7f5
Upstream Hackerone Report: https://hackerone.com/reports/387250