Amazon Linux 1 Security Advisory: ALAS-2013-248
Advisory Release Date: 2013-11-22 21:42 Pacific
Advisory Updated Date: 2014-09-16 21:54 Pacific
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
Affected Packages:
ruby
Issue Correction:
Run yum update ruby to update your system.
i686:
ruby-debuginfo-1.8.7.374-2.11.amzn1.i686
ruby-devel-1.8.7.374-2.11.amzn1.i686
ruby-1.8.7.374-2.11.amzn1.i686
ruby-libs-1.8.7.374-2.11.amzn1.i686
ruby-static-1.8.7.374-2.11.amzn1.i686
ruby-ri-1.8.7.374-2.11.amzn1.i686
noarch:
ruby-rdoc-1.8.7.374-2.11.amzn1.noarch
ruby-irb-1.8.7.374-2.11.amzn1.noarch
src:
ruby-1.8.7.374-2.11.amzn1.src
x86_64:
ruby-debuginfo-1.8.7.374-2.11.amzn1.x86_64
ruby-devel-1.8.7.374-2.11.amzn1.x86_64
ruby-libs-1.8.7.374-2.11.amzn1.x86_64
ruby-ri-1.8.7.374-2.11.amzn1.x86_64
ruby-static-1.8.7.374-2.11.amzn1.x86_64
ruby-1.8.7.374-2.11.amzn1.x86_64