CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
73.1%
Issue Overview:
IV Reuse in GCM Mode:
The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism. (CVE-2016-7798)
Affected Packages:
ruby23
Issue Correction:
Run yum update ruby23 to update your system.
New Packages:
i686:
ruby23-debuginfo-2.3.4-1.15.amzn1.i686
ruby23-devel-2.3.4-1.15.amzn1.i686
rubygem23-psych-2.1.0-1.15.amzn1.i686
rubygem23-io-console-0.4.5-1.15.amzn1.i686
ruby23-2.3.4-1.15.amzn1.i686
rubygem23-bigdecimal-1.2.8-1.15.amzn1.i686
ruby23-libs-2.3.4-1.15.amzn1.i686
noarch:
ruby23-doc-2.3.4-1.15.amzn1.noarch
rubygems23-devel-2.5.2-1.15.amzn1.noarch
rubygem23-did_you_mean-1.0.0-1.15.amzn1.noarch
ruby23-irb-2.3.4-1.15.amzn1.noarch
rubygems23-2.5.2-1.15.amzn1.noarch
src:
ruby23-2.3.4-1.15.amzn1.src
x86_64:
ruby23-2.3.4-1.15.amzn1.x86_64
rubygem23-io-console-0.4.5-1.15.amzn1.x86_64
ruby23-devel-2.3.4-1.15.amzn1.x86_64
rubygem23-bigdecimal-1.2.8-1.15.amzn1.x86_64
ruby23-debuginfo-2.3.4-1.15.amzn1.x86_64
ruby23-libs-2.3.4-1.15.amzn1.x86_64
rubygem23-psych-2.1.0-1.15.amzn1.x86_64
Red Hat: CVE-2016-7798
Mitre: CVE-2016-7798
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | ruby23-debuginfo | < 2.3.4-1.15.amzn1 | ruby23-debuginfo-2.3.4-1.15.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | ruby23-devel | < 2.3.4-1.15.amzn1 | ruby23-devel-2.3.4-1.15.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | rubygem23-psych | < 2.1.0-1.15.amzn1 | rubygem23-psych-2.1.0-1.15.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | rubygem23-io-console | < 0.4.5-1.15.amzn1 | rubygem23-io-console-0.4.5-1.15.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | ruby23 | < 2.3.4-1.15.amzn1 | ruby23-2.3.4-1.15.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | rubygem23-bigdecimal | < 1.2.8-1.15.amzn1 | rubygem23-bigdecimal-1.2.8-1.15.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | ruby23-libs | < 2.3.4-1.15.amzn1 | ruby23-libs-2.3.4-1.15.amzn1.i686.rpm |
Amazon Linux | 1 | noarch | ruby23-doc | < 2.3.4-1.15.amzn1 | ruby23-doc-2.3.4-1.15.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | rubygems23-devel | < 2.5.2-1.15.amzn1 | rubygems23-devel-2.5.2-1.15.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | rubygem23-did_you_mean | < 1.0.0-1.15.amzn1 | rubygem23-did_you_mean-1.0.0-1.15.amzn1.noarch.rpm |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS
Percentile
73.1%