Amazon Linux AMI : ruby19 / ruby20,ruby21,ruby22 (ALAS-2016-632)

Medium Nessus Plugin ID 87966

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

DL::dlopen could open a library with tainted library name even if $SAFE > 0.

Solution

Run 'yum update ruby19' to update your system.

Run 'yum update ruby20' to update your system.

Run 'yum update ruby21' to update your system.

Run 'yum update ruby22' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2016-632.html

Plugin Details

Severity: Medium

ID: 87966

File Name: ala_ALAS-2016-632.nasl

Version: 2.4

Type: local

Agent: unix

Published: 2016/01/19

Updated: 2018/04/18

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS v3.0

Base Score: 8.4

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:ruby19, p-cpe:/a:amazon:linux:ruby19-debuginfo, p-cpe:/a:amazon:linux:ruby19-devel, p-cpe:/a:amazon:linux:ruby19-doc, p-cpe:/a:amazon:linux:ruby19-irb, p-cpe:/a:amazon:linux:ruby19-libs, p-cpe:/a:amazon:linux:ruby20, p-cpe:/a:amazon:linux:ruby20-debuginfo, p-cpe:/a:amazon:linux:ruby20-devel, p-cpe:/a:amazon:linux:ruby20-doc, p-cpe:/a:amazon:linux:ruby20-irb, p-cpe:/a:amazon:linux:ruby20-libs, p-cpe:/a:amazon:linux:ruby21, p-cpe:/a:amazon:linux:ruby21-debuginfo, p-cpe:/a:amazon:linux:ruby21-devel, p-cpe:/a:amazon:linux:ruby21-doc, p-cpe:/a:amazon:linux:ruby21-irb, p-cpe:/a:amazon:linux:ruby21-libs, p-cpe:/a:amazon:linux:ruby22, p-cpe:/a:amazon:linux:ruby22-debuginfo, p-cpe:/a:amazon:linux:ruby22-devel, p-cpe:/a:amazon:linux:ruby22-doc, p-cpe:/a:amazon:linux:ruby22-irb, p-cpe:/a:amazon:linux:ruby22-libs, p-cpe:/a:amazon:linux:rubygem19-bigdecimal, p-cpe:/a:amazon:linux:rubygem19-io-console, p-cpe:/a:amazon:linux:rubygem19-json, p-cpe:/a:amazon:linux:rubygem19-minitest, p-cpe:/a:amazon:linux:rubygem19-rake, p-cpe:/a:amazon:linux:rubygem19-rdoc, p-cpe:/a:amazon:linux:rubygem20-bigdecimal, p-cpe:/a:amazon:linux:rubygem20-io-console, p-cpe:/a:amazon:linux:rubygem20-psych, p-cpe:/a:amazon:linux:rubygem21-bigdecimal, p-cpe:/a:amazon:linux:rubygem21-io-console, p-cpe:/a:amazon:linux:rubygem21-psych, p-cpe:/a:amazon:linux:rubygem22-bigdecimal, p-cpe:/a:amazon:linux:rubygem22-io-console, p-cpe:/a:amazon:linux:rubygem22-psych, p-cpe:/a:amazon:linux:rubygems19, p-cpe:/a:amazon:linux:rubygems19-devel, p-cpe:/a:amazon:linux:rubygems20, p-cpe:/a:amazon:linux:rubygems20-devel, p-cpe:/a:amazon:linux:rubygems21, p-cpe:/a:amazon:linux:rubygems21-devel, p-cpe:/a:amazon:linux:rubygems22, p-cpe:/a:amazon:linux:rubygems22-devel, cpe:/o:amazon:linux

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Patch Publication Date: 2016/01/18

Reference Information

CVE: CVE-2015-7551

ALAS: 2016-632