First published: Thu Apr 24 2014(Updated: )
** DISPUTED ** The openssl extension in Ruby 2.x does not properly maintain the state of process memory after a file is reopened, which allows remote attackers to spoof signatures within the context of a Ruby script that attempts signature verification after performing a certain sequence of filesystem operations. NOTE: this issue has been disputed by the Ruby OpenSSL team and third parties, who state that the original demonstration PoC contains errors and redundant or unnecessarily-complex code that does not appear to be related to a demonstration of the issue. As of 20140502, CVE is not aware of any public comment by the original researcher.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | =2.0 | |
Ruby-lang Ruby | =2.0.0 | |
Ruby-lang Ruby | =2.0.0-p0 | |
Ruby-lang Ruby | =2.0.0-p195 | |
Ruby-lang Ruby | =2.0.0-p247 | |
Ruby-lang Ruby | =2.0.0-preview1 | |
Ruby-lang Ruby | =2.0.0-preview2 | |
Ruby-lang Ruby | =2.0.0-rc1 | |
Ruby-lang Ruby | =2.0.0-rc2 | |
Ruby-lang Ruby | =2.1 | |
Ruby-lang Ruby | =2.1-preview1 | |
Ruby-lang Ruby | =2.1.1 | |
=2.0 | ||
=2.0.0 | ||
=2.0.0-p0 | ||
=2.0.0-p195 | ||
=2.0.0-p247 | ||
=2.0.0-preview1 | ||
=2.0.0-preview2 | ||
=2.0.0-rc1 | ||
=2.0.0-rc2 | ||
=2.1 | ||
=2.1-preview1 | ||
=2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.