Moderate CentOS ruby Update

Metadata

medium
5.0
ruby-1.8.7.352-10.el6_4.i686.rpm, ruby-1.8.7.352-10.el6_4.src.rpm, ruby-1.8.7.352-10.el6_4.x86_64.rpm, ruby-devel-1.8.7.352-10.el6_4.i686.rpm, ruby-devel-1.8.7.352-10.el6_4.x86_64.rpm, ruby-docs-1.8.7.352-10.el6_4.i686.rpm, ruby-docs-1.8.7.352-10.el6_4.x86_64.rpm, ruby-irb-1.8.7.352-10.el6_4.i686.rpm, ruby-irb-1.8.7.352-10.el6_4.x86_64.rpm, ruby-libs-1.8.7.352-10.el6_4.i686.rpm, ruby-libs-1.8.7.352-10.el6_4.x86_64.rpm, ruby-rdoc-1.8.7.352-10.el6_4.i686.rpm, ruby-rdoc-1.8.7.352-10.el6_4.x86_64.rpm, ruby-ri-1.8.7.352-10.el6_4.i686.rpm, ruby-ri-1.8.7.352-10.el6_4.x86_64.rpm, ruby-static-1.8.7.352-10.el6_4.i686.rpm, ruby-static-1.8.7.352-10.el6_4.x86_64.rpm, ruby-tcltk-1.8.7.352-10.el6_4.i686.rpm, ruby-tcltk-1.8.7.352-10.el6_4.x86_64.rpm
CVE-2012-4481, CVE-2013-1821
rhn.redhat.com, lists.centos.org
2013-03-09
2017-07-27 19:05
ALAS-2013-195
ALAS-2013-173
Moderate CentOS ruby Update
Moderate CentOS ruby Update
CVE-2013-1821 ruby1.9.1
CVE-2013-1821 ruby1.8
CVE-2012-4481 ruby1.8
CVE-2013-1821
CVE-2012-4481
2017-04-01 19:06
2017-01-05 20:10

Description


Updated ruby packages that fix two security issues are now available for
Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Ruby is an extensible, interpreted, object-oriented, scripting language. It
has features to process text files and to do system management tasks.

It was discovered that Ruby's REXML library did not properly restrict XML
entity expansion. An attacker could use this flaw to cause a denial of
service by tricking a Ruby application using REXML to read text nodes from
specially-crafted XML content, which will result in REXML consuming large
amounts of system memory. (CVE-2013-1821)

It was found that the RHSA-2011:0910 update did not correctly fix the
CVE-2011-1005 issue, a flaw in the method for translating an exception
message into a string in the Exception class. A remote attacker could use
this flaw to bypass safe level 4 restrictions, allowing untrusted (tainted)
code to modify arbitrary, trusted (untainted) strings, which safe level 4
restrictions would otherwise prevent. (CVE-2012-4481)

The CVE-2012-4481 issue was discovered by Vit Ondruch of Red Hat.

All users of Ruby are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 ruby ruby-1.8.7.352-10.el6_4.i686.rpm
ruby ruby-1.8.7.352-10.el6_4.src.rpm
ruby ruby-1.8.7.352-10.el6_4.x86_64.rpm
ruby-devel ruby-devel-1.8.7.352-10.el6_4.i686.rpm
ruby-devel ruby-devel-1.8.7.352-10.el6_4.x86_64.rpm
ruby-docs ruby-docs-1.8.7.352-10.el6_4.i686.rpm
ruby-docs ruby-docs-1.8.7.352-10.el6_4.x86_64.rpm
ruby-irb ruby-irb-1.8.7.352-10.el6_4.i686.rpm
ruby-irb ruby-irb-1.8.7.352-10.el6_4.x86_64.rpm
ruby-libs ruby-libs-1.8.7.352-10.el6_4.i686.rpm
ruby-libs ruby-libs-1.8.7.352-10.el6_4.x86_64.rpm
ruby-rdoc ruby-rdoc-1.8.7.352-10.el6_4.i686.rpm
ruby-rdoc ruby-rdoc-1.8.7.352-10.el6_4.x86_64.rpm
ruby-ri ruby-ri-1.8.7.352-10.el6_4.i686.rpm
ruby-ri ruby-ri-1.8.7.352-10.el6_4.x86_64.rpm
ruby-static ruby-static-1.8.7.352-10.el6_4.i686.rpm
ruby-static ruby-static-1.8.7.352-10.el6_4.x86_64.rpm
ruby-tcltk ruby-tcltk-1.8.7.352-10.el6_4.i686.rpm
ruby-tcltk ruby-tcltk-1.8.7.352-10.el6_4.x86_64.rpm