AlmaLinux 8 : ruby:2.5 (ALSA-2022:0545)

high Nessus Plugin ID 158845

Synopsis

The remote AlmaLinux host is missing a security update.

Description

The remote AlmaLinux 8 host has packages installed that are affected by a vulnerability as referenced in the ALSA-2022:0545 advisory.

- Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every Dependency Confusion issue in every product. (CVE-2020-36327)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://errata.almalinux.org/8/ALSA-2022-0545.html

Plugin Details

Severity: High

ID: 158845

File Name: alma_linux_ALSA-2022-0545.nasl

Version: 1.3

Type: local

Published: 3/11/2022

Updated: 11/6/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-36327

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:alma:linux:ruby, p-cpe:/a:alma:linux:ruby-devel, p-cpe:/a:alma:linux:ruby-doc, p-cpe:/a:alma:linux:ruby-irb, p-cpe:/a:alma:linux:ruby-libs, p-cpe:/a:alma:linux:rubygem-abrt, p-cpe:/a:alma:linux:rubygem-abrt-doc, p-cpe:/a:alma:linux:rubygem-bigdecimal, p-cpe:/a:alma:linux:rubygem-bson, p-cpe:/a:alma:linux:rubygem-bson-doc, p-cpe:/a:alma:linux:rubygem-bundler, p-cpe:/a:alma:linux:rubygem-bundler-doc, p-cpe:/a:alma:linux:rubygem-did_you_mean, p-cpe:/a:alma:linux:rubygem-io-console, p-cpe:/a:alma:linux:rubygem-json, p-cpe:/a:alma:linux:rubygem-minitest, p-cpe:/a:alma:linux:rubygem-mongo, p-cpe:/a:alma:linux:rubygem-mongo-doc, p-cpe:/a:alma:linux:rubygem-mysql2, p-cpe:/a:alma:linux:rubygem-mysql2-doc, p-cpe:/a:alma:linux:rubygem-net-telnet, p-cpe:/a:alma:linux:rubygem-openssl, p-cpe:/a:alma:linux:rubygem-pg, p-cpe:/a:alma:linux:rubygem-pg-doc, p-cpe:/a:alma:linux:rubygem-power_assert, p-cpe:/a:alma:linux:rubygem-psych, p-cpe:/a:alma:linux:rubygem-rake, p-cpe:/a:alma:linux:rubygem-rdoc, p-cpe:/a:alma:linux:rubygem-test-unit, p-cpe:/a:alma:linux:rubygem-xmlrpc, p-cpe:/a:alma:linux:rubygems, p-cpe:/a:alma:linux:rubygems-devel, cpe:/o:alma:linux:8

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/AlmaLinux/release, Host/AlmaLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/16/2022

Vulnerability Publication Date: 4/29/2021

Reference Information

CVE: CVE-2020-36327