https://errata.rockylinux.org/RLSA-2021:2587
https://bugzilla.redhat.com/show_bug.cgi?id=1773728
https://bugzilla.redhat.com/show_bug.cgi?id=1789407
https://bugzilla.redhat.com/show_bug.cgi?id=1789556
https://bugzilla.redhat.com/show_bug.cgi?id=1793683
https://bugzilla.redhat.com/show_bug.cgi?id=1827500
https://bugzilla.redhat.com/show_bug.cgi?id=1833291
https://bugzilla.redhat.com/show_bug.cgi?id=1883623
https://bugzilla.redhat.com/show_bug.cgi?id=1947526
Severity: High
ID: 157806
File Name: rocky_linux_RLSA-2021-2587.nasl
Version: 1.5
Type: local
Published: 2/9/2022
Updated: 11/9/2023
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.7
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2019-16255
Risk Factor: High
Base Score: 8.1
Temporal Score: 7.3
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C
CPE: p-cpe:/a:rocky:linux:ruby, p-cpe:/a:rocky:linux:ruby-debuginfo, p-cpe:/a:rocky:linux:ruby-debugsource, p-cpe:/a:rocky:linux:ruby-devel, p-cpe:/a:rocky:linux:ruby-doc, p-cpe:/a:rocky:linux:ruby-irb, p-cpe:/a:rocky:linux:ruby-libs, p-cpe:/a:rocky:linux:ruby-libs-debuginfo, p-cpe:/a:rocky:linux:rubygem-abrt, p-cpe:/a:rocky:linux:rubygem-abrt-doc, p-cpe:/a:rocky:linux:rubygem-bigdecimal, p-cpe:/a:rocky:linux:rubygem-bigdecimal-debuginfo, p-cpe:/a:rocky:linux:rubygem-bson, p-cpe:/a:rocky:linux:rubygem-bson-debuginfo, p-cpe:/a:rocky:linux:rubygem-bson-debugsource, p-cpe:/a:rocky:linux:rubygem-bson-doc, p-cpe:/a:rocky:linux:rubygem-bundler, p-cpe:/a:rocky:linux:rubygem-bundler-doc, p-cpe:/a:rocky:linux:rubygem-did_you_mean, p-cpe:/a:rocky:linux:rubygem-io-console, p-cpe:/a:rocky:linux:rubygem-io-console-debuginfo, p-cpe:/a:rocky:linux:rubygem-json, p-cpe:/a:rocky:linux:rubygem-json-debuginfo, p-cpe:/a:rocky:linux:rubygem-minitest, p-cpe:/a:rocky:linux:rubygem-mongo, p-cpe:/a:rocky:linux:rubygem-mongo-doc, p-cpe:/a:rocky:linux:rubygem-mysql2, p-cpe:/a:rocky:linux:rubygem-mysql2-debuginfo, p-cpe:/a:rocky:linux:rubygem-mysql2-debugsource, p-cpe:/a:rocky:linux:rubygem-mysql2-doc, p-cpe:/a:rocky:linux:rubygem-net-telnet, p-cpe:/a:rocky:linux:rubygem-openssl, p-cpe:/a:rocky:linux:rubygem-openssl-debuginfo, p-cpe:/a:rocky:linux:rubygem-pg, p-cpe:/a:rocky:linux:rubygem-pg-debuginfo, p-cpe:/a:rocky:linux:rubygem-pg-debugsource, p-cpe:/a:rocky:linux:rubygem-pg-doc, p-cpe:/a:rocky:linux:rubygem-power_assert, p-cpe:/a:rocky:linux:rubygem-psych, p-cpe:/a:rocky:linux:rubygem-psych-debuginfo, p-cpe:/a:rocky:linux:rubygem-rake, p-cpe:/a:rocky:linux:rubygem-rdoc, p-cpe:/a:rocky:linux:rubygem-test-unit, p-cpe:/a:rocky:linux:rubygem-xmlrpc, p-cpe:/a:rocky:linux:rubygems, p-cpe:/a:rocky:linux:rubygems-devel, cpe:/o:rocky:linux:8
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/22/2021
Vulnerability Publication Date: 11/26/2019
CVE: CVE-2019-15845, CVE-2019-16201, CVE-2019-16254, CVE-2019-16255, CVE-2020-10663, CVE-2020-10933, CVE-2020-25613, CVE-2021-28965