ALAS-2012-139


Amazon Linux 1 Security Advisory: ALAS-2012-139
Advisory Release Date: 2012-10-23 10:43 Pacific
Advisory Updated Date: 2014-09-14 17:14 Pacific
Severity: Medium

Issue Overview:

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.


Affected Packages:

ruby


Issue Correction:
Run yum update ruby to update your system.

New Packages:
i686:
    ruby-libs-1.8.7.371-1.20.amzn1.i686
    ruby-1.8.7.371-1.20.amzn1.i686
    ruby-debuginfo-1.8.7.371-1.20.amzn1.i686
    ruby-devel-1.8.7.371-1.20.amzn1.i686
    ruby-ri-1.8.7.371-1.20.amzn1.i686
    ruby-static-1.8.7.371-1.20.amzn1.i686

noarch:
    ruby-irb-1.8.7.371-1.20.amzn1.noarch
    ruby-rdoc-1.8.7.371-1.20.amzn1.noarch

src:
    ruby-1.8.7.371-1.20.amzn1.src

x86_64:
    ruby-debuginfo-1.8.7.371-1.20.amzn1.x86_64
    ruby-devel-1.8.7.371-1.20.amzn1.x86_64
    ruby-ri-1.8.7.371-1.20.amzn1.x86_64
    ruby-libs-1.8.7.371-1.20.amzn1.x86_64
    ruby-1.8.7.371-1.20.amzn1.x86_64
    ruby-static-1.8.7.371-1.20.amzn1.x86_64