ALAS-2015-532

Related Vulnerabilities: CVE-2015-1855  

As discussed in <a href="https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/">an upstream announcement</a>, Ruby's OpenSSL extension suffers a vulnerability through overly permissive matching of hostnames, which can lead to similar bugs such as CVE-2014-1492.

ALAS-2015-532


Amazon Linux AMI Security Advisory: ALAS-2015-532
Advisory Release Date: 2015-05-27 14:06 Pacific
Advisory Updated Date: 2015-05-27 15:23 Pacific
Severity: Medium
References: CVE-2015-1855 

Issue Overview:

As discussed in <a href="https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/">an upstream announcement</a>, Ruby's OpenSSL extension suffers a vulnerability through overly permissive matching of hostnames, which can lead to similar bugs such as CVE-2014-1492.


Affected Packages:

ruby21


Issue Correction:
Run yum update ruby21 to update your system.

New Packages:
i686:
    rubygem21-io-console-0.4.3-1.16.amzn1.i686
    ruby21-debuginfo-2.1.6-1.16.amzn1.i686
    rubygem21-bigdecimal-1.2.4-1.16.amzn1.i686
    ruby21-2.1.6-1.16.amzn1.i686
    rubygem21-psych-2.0.5-1.16.amzn1.i686
    ruby21-libs-2.1.6-1.16.amzn1.i686
    ruby21-devel-2.1.6-1.16.amzn1.i686

noarch:
    ruby21-irb-2.1.6-1.16.amzn1.noarch
    rubygems21-devel-2.2.3-1.16.amzn1.noarch
    rubygems21-2.2.3-1.16.amzn1.noarch
    ruby21-doc-2.1.6-1.16.amzn1.noarch

src:
    ruby21-2.1.6-1.16.amzn1.src

x86_64:
    ruby21-devel-2.1.6-1.16.amzn1.x86_64
    rubygem21-bigdecimal-1.2.4-1.16.amzn1.x86_64
    ruby21-debuginfo-2.1.6-1.16.amzn1.x86_64
    ruby21-2.1.6-1.16.amzn1.x86_64
    rubygem21-io-console-0.4.3-1.16.amzn1.x86_64
    ruby21-libs-2.1.6-1.16.amzn1.x86_64
    rubygem21-psych-2.0.5-1.16.amzn1.x86_64