ALAS-2013-248


Amazon Linux 1 Security Advisory: ALAS-2013-248
Advisory Release Date: 2013-11-22 21:42 Pacific
Advisory Updated Date: 2014-09-16 21:54 Pacific
Severity: Critical

Issue Overview:

Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.


Affected Packages:

ruby


Issue Correction:
Run yum update ruby to update your system.

New Packages:
i686:
    ruby-debuginfo-1.8.7.374-2.11.amzn1.i686
    ruby-devel-1.8.7.374-2.11.amzn1.i686
    ruby-1.8.7.374-2.11.amzn1.i686
    ruby-libs-1.8.7.374-2.11.amzn1.i686
    ruby-static-1.8.7.374-2.11.amzn1.i686
    ruby-ri-1.8.7.374-2.11.amzn1.i686

noarch:
    ruby-rdoc-1.8.7.374-2.11.amzn1.noarch
    ruby-irb-1.8.7.374-2.11.amzn1.noarch

src:
    ruby-1.8.7.374-2.11.amzn1.src

x86_64:
    ruby-debuginfo-1.8.7.374-2.11.amzn1.x86_64
    ruby-devel-1.8.7.374-2.11.amzn1.x86_64
    ruby-libs-1.8.7.374-2.11.amzn1.x86_64
    ruby-ri-1.8.7.374-2.11.amzn1.x86_64
    ruby-static-1.8.7.374-2.11.amzn1.x86_64
    ruby-1.8.7.374-2.11.amzn1.x86_64