Description
The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
References (8)
Core 8
Core References
Mailing List, Patch, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/09/30/6
Third Party Advisory vendor-advisory
x_refsource_debian
https://www.debian.org/security/2017/dsa-3966
Patch, Third Party Advisory x_refsource_confirm
https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/10/01/2
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/09/19/9
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/93031
Exploit, Third Party Advisory x_refsource_confirm
https://github.com/ruby/openssl/issues/49
Scores
CVSS v3
7.5
EPSS
0.0056
EPSS Percentile
68.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-326
Status
published
Products (4)
debian/debian_linux
8.0
debian/debian_linux
9.0
ruby-lang/openssl
< 2.0.0
rubygems/openssl
0 - 2.0.0RubyGems
Published
Jan 30, 2017
Tracked Since
Feb 18, 2026