CVE-2015-1855
Public on 2015-05-27
        Modified on 2024-04-22
        
      Description
            
              It was discovered that the Ruby OpenSSL extension was overly permissive when verifying host names against X.509 certificate names with wildcards. This could cause Ruby TLS/SSL clients to accept certain certificates as valid, which is a violation of the RFC 6125 recommendations.
            
          Severity
          
          See what this means
        CVSS v3 Base Score
          
          See breakdown
        Affected Packages
| Platform | Package | Release Date | Advisory | Status | 
|---|---|---|---|---|
| Amazon Linux 1 | ruby | No Fix Planned | ||
| Amazon Linux 2 - Core | ruby | Not Affected | ||
| Amazon Linux 1 | ruby18 | 2015-05-27 | ALAS-2015-529 | Fixed | 
| Amazon Linux 1 | ruby19 | 2015-05-27 | ALAS-2015-530 | Fixed | 
| Amazon Linux 1 | ruby20 | 2015-05-27 | ALAS-2015-531 | Fixed | 
| Amazon Linux 1 | ruby21 | 2015-05-27 | ALAS-2015-532 | Fixed | 
| Amazon Linux 1 | ruby22 | 2015-05-27 | ALAS-2015-533 | Fixed | 
| Amazon Linux 1 | ruby23 | No Fix Planned | ||
| Amazon Linux 1 | ruby24 | No Fix Planned | ||
| Amazon Linux 2023 | ruby3.2 | Not Affected | 
CVSS Scores
| Score Type | Score | Vector | |
|---|---|---|---|
| Amazon Linux | CVSSv3 | 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N | 
| NVD | CVSSv2 | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N | 
| NVD | CVSSv3 | 5.9 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |