Moderate CentOS ruby Update

Metadata

medium
5.0
ruby-1.8.5-29.el5_9.i386.rpm, ruby-1.8.5-29.el5_9.src.rpm, ruby-1.8.5-29.el5_9.x86_64.rpm, ruby-devel-1.8.5-29.el5_9.i386.rpm, ruby-devel-1.8.5-29.el5_9.x86_64.rpm, ruby-docs-1.8.5-29.el5_9.i386.rpm, ruby-docs-1.8.5-29.el5_9.x86_64.rpm, ruby-irb-1.8.5-29.el5_9.i386.rpm, ruby-irb-1.8.5-29.el5_9.x86_64.rpm, ruby-libs-1.8.5-29.el5_9.i386.rpm, ruby-libs-1.8.5-29.el5_9.x86_64.rpm, ruby-mode-1.8.5-29.el5_9.i386.rpm, ruby-mode-1.8.5-29.el5_9.x86_64.rpm, ruby-rdoc-1.8.5-29.el5_9.i386.rpm, ruby-rdoc-1.8.5-29.el5_9.x86_64.rpm, ruby-ri-1.8.5-29.el5_9.i386.rpm, ruby-ri-1.8.5-29.el5_9.x86_64.rpm, ruby-tcltk-1.8.5-29.el5_9.i386.rpm, ruby-tcltk-1.8.5-29.el5_9.x86_64.rpm
CVE-2013-1821
rhn.redhat.com, lists.centos.org, lists.centos.org
2013-03-08
2017-07-27 19:05
ALAS-2013-195
ALAS-2013-173
Moderate CentOS ruby Update
CVE-2013-1821 ruby1.8
CVE-2013-1821 ruby1.9.1
CVE-2013-1821
2017-04-01 19:06
2017-01-05 20:10

Description


Updated ruby packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Ruby is an extensible, interpreted, object-oriented, scripting language. It
has features to process text files and to do system management tasks.

It was discovered that Ruby's REXML library did not properly restrict XML
entity expansion. An attacker could use this flaw to cause a denial of
service by tricking a Ruby application using REXML to read text nodes from
specially-crafted XML content, which will result in REXML consuming large
amounts of system memory. (CVE-2013-1821)

All users of Ruby are advised to upgrade to these updated packages, which
contain backported patches to resolve this issue.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
5 ruby ruby-1.8.5-29.el5_9.i386.rpm
ruby ruby-1.8.5-29.el5_9.src.rpm
ruby ruby-1.8.5-29.el5_9.x86_64.rpm
ruby-devel ruby-devel-1.8.5-29.el5_9.i386.rpm
ruby-devel ruby-devel-1.8.5-29.el5_9.x86_64.rpm
ruby-docs ruby-docs-1.8.5-29.el5_9.i386.rpm
ruby-docs ruby-docs-1.8.5-29.el5_9.x86_64.rpm
ruby-irb ruby-irb-1.8.5-29.el5_9.i386.rpm
ruby-irb ruby-irb-1.8.5-29.el5_9.x86_64.rpm
ruby-libs ruby-libs-1.8.5-29.el5_9.i386.rpm
ruby-libs ruby-libs-1.8.5-29.el5_9.x86_64.rpm
ruby-mode ruby-mode-1.8.5-29.el5_9.i386.rpm
ruby-mode ruby-mode-1.8.5-29.el5_9.x86_64.rpm
ruby-rdoc ruby-rdoc-1.8.5-29.el5_9.i386.rpm
ruby-rdoc ruby-rdoc-1.8.5-29.el5_9.x86_64.rpm
ruby-ri ruby-ri-1.8.5-29.el5_9.i386.rpm
ruby-ri ruby-ri-1.8.5-29.el5_9.x86_64.rpm
ruby-tcltk ruby-tcltk-1.8.5-29.el5_9.i386.rpm
ruby-tcltk ruby-tcltk-1.8.5-29.el5_9.x86_64.rpm