Critical CentOS ruby Update

Metadata

medium
6.8
ruby-1.8.7.352-13.el6.i686.rpm, ruby-1.8.7.352-13.el6.src.rpm, ruby-1.8.7.352-13.el6.x86_64.rpm, ruby-devel-1.8.7.352-13.el6.i686.rpm, ruby-devel-1.8.7.352-13.el6.x86_64.rpm, ruby-docs-1.8.7.352-13.el6.i686.rpm, ruby-docs-1.8.7.352-13.el6.x86_64.rpm, ruby-irb-1.8.7.352-13.el6.i686.rpm, ruby-irb-1.8.7.352-13.el6.x86_64.rpm, ruby-libs-1.8.7.352-13.el6.i686.rpm, ruby-libs-1.8.7.352-13.el6.x86_64.rpm, ruby-rdoc-1.8.7.352-13.el6.i686.rpm, ruby-rdoc-1.8.7.352-13.el6.x86_64.rpm, ruby-ri-1.8.7.352-13.el6.i686.rpm, ruby-ri-1.8.7.352-13.el6.x86_64.rpm, ruby-static-1.8.7.352-13.el6.i686.rpm, ruby-static-1.8.7.352-13.el6.x86_64.rpm, ruby-tcltk-1.8.7.352-13.el6.i686.rpm, ruby-tcltk-1.8.7.352-13.el6.x86_64.rpm
CVE-2013-4164
rhn.redhat.com, lists.centos.org
2013-11-26
2017-07-27 19:06
ALAS-2013-247
ALAS-2013-248
CVE-2013-4164 ruby1.8
CVE-2013-4164 ruby1.9.1
CVE-2013-4164
2017-04-01 19:07
2017-01-05 20:11

Description


Updated ruby packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Ruby is an extensible, interpreted, object-oriented, scripting language.
It has features to process text files and to perform system management
tasks.

A buffer overflow flaw was found in the way Ruby parsed floating point
numbers from their text representation. If an application using Ruby
accepted untrusted input strings and converted them to floating point
numbers, an attacker able to provide such input could cause the application
to crash or, possibly, execute arbitrary code with the privileges of the
application. (CVE-2013-4164)

All ruby users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 ruby ruby-1.8.7.352-13.el6.i686.rpm
ruby ruby-1.8.7.352-13.el6.src.rpm
ruby ruby-1.8.7.352-13.el6.x86_64.rpm
ruby-devel ruby-devel-1.8.7.352-13.el6.i686.rpm
ruby-devel ruby-devel-1.8.7.352-13.el6.x86_64.rpm
ruby-docs ruby-docs-1.8.7.352-13.el6.i686.rpm
ruby-docs ruby-docs-1.8.7.352-13.el6.x86_64.rpm
ruby-irb ruby-irb-1.8.7.352-13.el6.i686.rpm
ruby-irb ruby-irb-1.8.7.352-13.el6.x86_64.rpm
ruby-libs ruby-libs-1.8.7.352-13.el6.i686.rpm
ruby-libs ruby-libs-1.8.7.352-13.el6.x86_64.rpm
ruby-rdoc ruby-rdoc-1.8.7.352-13.el6.i686.rpm
ruby-rdoc ruby-rdoc-1.8.7.352-13.el6.x86_64.rpm
ruby-ri ruby-ri-1.8.7.352-13.el6.i686.rpm
ruby-ri ruby-ri-1.8.7.352-13.el6.x86_64.rpm
ruby-static ruby-static-1.8.7.352-13.el6.i686.rpm
ruby-static ruby-static-1.8.7.352-13.el6.x86_64.rpm
ruby-tcltk ruby-tcltk-1.8.7.352-13.el6.i686.rpm
ruby-tcltk ruby-tcltk-1.8.7.352-13.el6.x86_64.rpm