Amazon Linux 1 Security Advisory: ALAS-2012-139
Advisory Release Date: 2012-10-23 10:43 Pacific
Advisory Updated Date: 2014-09-14 17:14 Pacific
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.
Affected Packages:
ruby
Issue Correction:
Run yum update ruby to update your system.
i686:
ruby-libs-1.8.7.371-1.20.amzn1.i686
ruby-1.8.7.371-1.20.amzn1.i686
ruby-debuginfo-1.8.7.371-1.20.amzn1.i686
ruby-devel-1.8.7.371-1.20.amzn1.i686
ruby-ri-1.8.7.371-1.20.amzn1.i686
ruby-static-1.8.7.371-1.20.amzn1.i686
noarch:
ruby-irb-1.8.7.371-1.20.amzn1.noarch
ruby-rdoc-1.8.7.371-1.20.amzn1.noarch
src:
ruby-1.8.7.371-1.20.amzn1.src
x86_64:
ruby-debuginfo-1.8.7.371-1.20.amzn1.x86_64
ruby-devel-1.8.7.371-1.20.amzn1.x86_64
ruby-ri-1.8.7.371-1.20.amzn1.x86_64
ruby-libs-1.8.7.371-1.20.amzn1.x86_64
ruby-1.8.7.371-1.20.amzn1.x86_64
ruby-static-1.8.7.371-1.20.amzn1.x86_64