Your submission was sent successfully! Close

USN-2035-1: Ruby vulnerabilities

27 November 2013

Several security issues were fixed in Ruby.



  • ruby1.8 - Object-oriented scripting language
  • ruby1.9.1 - Object-oriented scripting language


Charlie Somerville discovered that Ruby incorrectly handled floating point
number conversion. An attacker could possibly use this issue with an
application that converts text to floating point numbers to cause the
application to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2013-4164)

Vit Ondruch discovered that Ruby did not perform taint checking for certain
functions. An attacker could possibly use this issue to bypass certain
intended restrictions. (CVE-2013-2065)