Your submission was sent successfully! Close

CVE-2013-4164

Published: 22 November 2013

Heap-based buffer overflow in Ruby 1.8, 1.9 before 1.9.3-p484, 2.0 before 2.0.0-p353, 2.1 before 2.1.0 preview2, and trunk before revision 43780 allows context-dependent attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a string that is converted to a floating point value, as demonstrated using (1) the to_f method or (2) JSON.parse.

Priority

Medium

Status

Package Release Status
ruby1.8
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (1.8.7.352-2ubuntu1.4)
quantal
Released (1.8.7.358-4ubuntu0.4)
raring
Released (1.8.7.358-7ubuntu1.2)
saucy
Released (1.8.7.358-7ubuntu2.1)
trusty Does not exist

upstream Needs triage

ruby1.9
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise Does not exist

quantal Does not exist

raring Does not exist

saucy Does not exist

trusty Does not exist

upstream Needs triage

ruby1.9.1
Launchpad, Ubuntu, Debian
lucid Ignored
(reached end-of-life)
precise
Released (1.9.3.0-1ubuntu2.8)
quantal
Released (1.9.3.194-1ubuntu1.6)
raring
Released (1.9.3.194-8.1ubuntu1.2)
saucy
Released (1.9.3.194-8.1ubuntu2.1)
trusty Does not exist
(trusty was released [1.9.3.448-1ubuntu2])
upstream
Released (1.9.3.484)
Patches:
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=43776
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=43782


ruby2.0
Launchpad, Ubuntu, Debian
lucid Does not exist

precise Does not exist

quantal Does not exist

raring Does not exist

saucy Ignored
(reached end-of-life)
trusty Does not exist
(trusty was released [2.0.0.343-1ubuntu1])
upstream
Released (2.0.0.353)
Patches:


upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=43778
upstream: http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=43783