Amazon Linux 1 Security Advisory: ALAS-2015-532
Advisory Release Date: 2015-05-27 14:06 Pacific
Advisory Updated Date: 2015-05-27 15:23 Pacific
As discussed in an upstream announcment (https://www.ruby-lang.org/en/news/2015/04/13/ruby-openssl-hostname-matching-vulnerability/), Ruby's OpenSSL extension suffers a vulnerability through overly permissive matching of hostnames, which can lead to similar bugs such as CVE-2014-1492.
Affected Packages:
ruby21
Issue Correction:
Run yum update ruby21 to update your system.
i686:
rubygem21-io-console-0.4.3-1.16.amzn1.i686
ruby21-debuginfo-2.1.6-1.16.amzn1.i686
rubygem21-bigdecimal-1.2.4-1.16.amzn1.i686
ruby21-2.1.6-1.16.amzn1.i686
rubygem21-psych-2.0.5-1.16.amzn1.i686
ruby21-libs-2.1.6-1.16.amzn1.i686
ruby21-devel-2.1.6-1.16.amzn1.i686
noarch:
ruby21-irb-2.1.6-1.16.amzn1.noarch
rubygems21-devel-2.2.3-1.16.amzn1.noarch
rubygems21-2.2.3-1.16.amzn1.noarch
ruby21-doc-2.1.6-1.16.amzn1.noarch
src:
ruby21-2.1.6-1.16.amzn1.src
x86_64:
ruby21-devel-2.1.6-1.16.amzn1.x86_64
rubygem21-bigdecimal-1.2.4-1.16.amzn1.x86_64
ruby21-debuginfo-2.1.6-1.16.amzn1.x86_64
ruby21-2.1.6-1.16.amzn1.x86_64
rubygem21-io-console-0.4.3-1.16.amzn1.x86_64
ruby21-libs-2.1.6-1.16.amzn1.x86_64
rubygem21-psych-2.0.5-1.16.amzn1.x86_64