Moderate CentOS ruby Update


ruby-1.8.5-31.el5_9.i386.rpm, ruby-1.8.5-31.el5_9.src.rpm, ruby-1.8.5-31.el5_9.x86_64.rpm, ruby-, ruby-, ruby-, ruby-devel-1.8.5-31.el5_9.i386.rpm, ruby-devel-1.8.5-31.el5_9.x86_64.rpm, ruby-devel-, ruby-devel-, ruby-docs-1.8.5-31.el5_9.i386.rpm, ruby-docs-1.8.5-31.el5_9.x86_64.rpm, ruby-docs-, ruby-docs-, ruby-irb-1.8.5-31.el5_9.i386.rpm, ruby-irb-1.8.5-31.el5_9.x86_64.rpm, ruby-irb-, ruby-irb-, ruby-libs-1.8.5-31.el5_9.i386.rpm, ruby-libs-1.8.5-31.el5_9.x86_64.rpm, ruby-libs-, ruby-libs-, ruby-mode-1.8.5-31.el5_9.i386.rpm, ruby-mode-1.8.5-31.el5_9.x86_64.rpm, ruby-rdoc-1.8.5-31.el5_9.i386.rpm, ruby-rdoc-1.8.5-31.el5_9.x86_64.rpm, ruby-rdoc-, ruby-rdoc-, ruby-ri-1.8.5-31.el5_9.i386.rpm, ruby-ri-1.8.5-31.el5_9.x86_64.rpm, ruby-ri-, ruby-ri-, ruby-static-, ruby-static-, ruby-tcltk-1.8.5-31.el5_9.i386.rpm, ruby-tcltk-1.8.5-31.el5_9.x86_64.rpm, ruby-tcltk-, ruby-tcltk-
2017-07-27 19:06
CVE-2013-4073 ruby1.9.1
CVE-2013-4073 ruby1.8
CVE-2013-4073 puppet
2017-04-01 19:07
2017-01-05 20:11


Updated ruby packages that fix one security issue are now available for
Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Ruby is an extensible, interpreted, object-oriented, scripting language.
It has features to process text files and to do system management tasks.

A flaw was found in Ruby's SSL client's hostname identity check when
handling certificates that contain hostnames with NULL bytes. An attacker
could potentially exploit this flaw to conduct man-in-the-middle attacks to
spoof SSL servers. Note that to exploit this issue, an attacker would need
to obtain a carefully-crafted certificate signed by an authority that the
client trusts. (CVE-2013-4073)

All users of Ruby are advised to upgrade to these updated packages, which
contain backported patches to resolve this issue.
Please see

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
5 ruby ruby-1.8.5-31.el5_9.i386.rpm
ruby ruby-1.8.5-31.el5_9.src.rpm
ruby ruby-1.8.5-31.el5_9.x86_64.rpm
ruby-devel ruby-devel-1.8.5-31.el5_9.i386.rpm
ruby-devel ruby-devel-1.8.5-31.el5_9.x86_64.rpm
ruby-docs ruby-docs-1.8.5-31.el5_9.i386.rpm
ruby-docs ruby-docs-1.8.5-31.el5_9.x86_64.rpm
ruby-irb ruby-irb-1.8.5-31.el5_9.i386.rpm
ruby-irb ruby-irb-1.8.5-31.el5_9.x86_64.rpm
ruby-libs ruby-libs-1.8.5-31.el5_9.i386.rpm
ruby-libs ruby-libs-1.8.5-31.el5_9.x86_64.rpm
ruby-mode ruby-mode-1.8.5-31.el5_9.i386.rpm
ruby-mode ruby-mode-1.8.5-31.el5_9.x86_64.rpm
ruby-rdoc ruby-rdoc-1.8.5-31.el5_9.i386.rpm
ruby-rdoc ruby-rdoc-1.8.5-31.el5_9.x86_64.rpm
ruby-ri ruby-ri-1.8.5-31.el5_9.i386.rpm
ruby-ri ruby-ri-1.8.5-31.el5_9.x86_64.rpm
ruby-tcltk ruby-tcltk-1.8.5-31.el5_9.i386.rpm
ruby-tcltk ruby-tcltk-1.8.5-31.el5_9.x86_64.rpm
6 ruby ruby-
ruby ruby-
ruby ruby-
ruby-devel ruby-devel-
ruby-devel ruby-devel-
ruby-docs ruby-docs-
ruby-docs ruby-docs-
ruby-irb ruby-irb-
ruby-irb ruby-irb-
ruby-libs ruby-libs-
ruby-libs ruby-libs-
ruby-rdoc ruby-rdoc-
ruby-rdoc ruby-rdoc-
ruby-ri ruby-ri-
ruby-ri ruby-ri-
ruby-static ruby-static-
ruby-static ruby-static-
ruby-tcltk ruby-tcltk-
ruby-tcltk ruby-tcltk-