First published: Thu Jul 10 2014(Updated: )
A possible stack-based buffer overflow flaw was reported in the Ruby encodes() function from pack.c. From the bug report, this function may be used on data received from a server, and could be triggered remotely. As the affected stack buffer is a static size on the stack, FORTIFY_SOURCE may help mitigate this issue to only be a denial of service. The original report suggests older versions (such as 1.9.3) are not affected. Bug report: <a href="https://bugs.ruby-lang.org/issues/10019">https://bugs.ruby-lang.org/issues/10019</a> CVE request: <a href="http://www.openwall.com/lists/oss-security/2014/07/09/13">http://www.openwall.com/lists/oss-security/2014/07/09/13</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | <=1.9.3 | |
Ruby-lang Ruby | =2.0 | |
Ruby-lang Ruby | =2.0.0 | |
Ruby-lang Ruby | =2.0.0-p0 | |
Ruby-lang Ruby | =2.0.0-p195 | |
Ruby-lang Ruby | =2.0.0-p247 | |
Ruby-lang Ruby | =2.0.0-preview1 | |
Ruby-lang Ruby | =2.0.0-preview2 | |
Ruby-lang Ruby | =2.0.0-rc1 | |
Ruby-lang Ruby | =2.0.0-rc2 | |
Ruby-lang Ruby | =2.1 | |
Ruby-lang Ruby | =2.1-preview1 | |
Ruby-lang Ruby | =2.1.1 | |
Ruby-lang Ruby | =2.1.2 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Hpc Node | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.