The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2016/09/30/6 | patch mailing list third party advisory |
https://www.debian.org/security/2017/dsa-3966 | third party advisory vendor advisory |
https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062 | third party advisory patch |
http://www.openwall.com/lists/oss-security/2016/10/01/2 | third party advisory mailing list |
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2016/09/19/9 | third party advisory mailing list |
http://www.securityfocus.com/bid/93031 | third party advisory vdb entry |
https://github.com/ruby/openssl/issues/49 | third party advisory exploit |