CVE-2013-4164
Publication date 22 November 2013
Last updated 24 July 2024
Ubuntu priority
Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.
Status
Package | Ubuntu Release | Status |
---|---|---|
ruby1.8 | 14.04 LTS trusty | Not in release |
ruby1.9 | 14.04 LTS trusty | Not in release |
ruby1.9.1 | 14.04 LTS trusty |
Fixed 1.9.3.448-1ubuntu2
|
ruby2.0 | 14.04 LTS trusty |
Fixed 2.0.0.343-1ubuntu1
|
Patch details
Package | Patch details |
---|---|
ruby1.9.1 | |
ruby2.0 |
References
Related Ubuntu Security Notices (USN)
- USN-2035-1
- Ruby vulnerabilities
- 27 November 2013