openssl is vulnerable to an authentication bypass. The library does not properly compare OpenSSL::X509::Name
objects, leading to non-equal objects to be returned as equal. This can allow a malicious user to pass a spoofed certificate to the system during the authentication process.
lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html
www.securitytracker.com/id/1042105
access.redhat.com/errata/RHSA-2018:3729
access.redhat.com/errata/RHSA-2018:3730
access.redhat.com/errata/RHSA-2018:3731
access.redhat.com/errata/RHSA-2018:3738
access.redhat.com/errata/RHSA-2019:1948
access.redhat.com/errata/RHSA-2019:2565
github.com/ruby/openssl/commit/f653cfa43f0f20e8c440122ea982382b6228e7f5
hackerone.com/reports/387250
lists.debian.org/debian-lts-announce/2018/10/msg00020.html
security.netapp.com/advisory/ntap-20190221-0002/
usn.ubuntu.com/3808-1/
www.debian.org/security/2018/dsa-4332
www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/
www.ruby-lang.org/en/news/2018/10/17/ruby-2-3-8-released/
www.ruby-lang.org/en/news/2018/10/17/ruby-2-4-5-released/
www.ruby-lang.org/en/news/2018/10/17/ruby-2-5-2-released/
www.ruby-lang.org/en/news/2018/11/06/ruby-2-6-0-preview3-released/