Search CVE reports


Toggle filters

21 – 30 of 62 results


CVE-2012-4522

Medium priority

Some fixes available 2 of 4

The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.

3 affected packages

ruby1.8, ruby1.9, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
ruby1.9
ruby1.9.1
Show less packages

CVE-2012-4481

Medium priority

Some fixes available 5 of 7

The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.

3 affected packages

ruby1.8, ruby1.9, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
ruby1.9
ruby1.9.1
Show less packages

CVE-2012-4466

Medium priority

Some fixes available 7 of 8

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API...

3 affected packages

ruby1.8, ruby1.9, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
ruby1.9
ruby1.9.1
Show less packages

CVE-2012-4464

Medium priority

Some fixes available 2 of 3

Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks...

3 affected packages

ruby1.9, ruby1.8, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.9
ruby1.8
ruby1.9.1
Show less packages

CVE-2011-4815

Medium priority

Some fixes available 4 of 5

Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted...

3 affected packages

ruby1.8, ruby1.9, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
ruby1.9
ruby1.9.1
Show less packages

CVE-2011-3009

Medium priority
Ignored

Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in...

1 affected package

ruby1.8

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
Show less packages

CVE-2011-2705

Medium priority

Some fixes available 3 of 9

The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the...

3 affected packages

ruby1.9, ruby1.8, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.9
ruby1.8
ruby1.9.1
Show less packages

CVE-2011-2686

Medium priority

Some fixes available 3 of 4

Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in...

1 affected package

ruby1.8

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
Show less packages

CVE-2011-1005

Low priority

Some fixes available 4 of 12

The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.

3 affected packages

ruby1.8, ruby1.9, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
ruby1.9
ruby1.9.1
Show less packages

CVE-2011-1004

Low priority

Some fixes available 3 of 14

The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.

3 affected packages

ruby1.8, ruby1.9, ruby1.9.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
ruby1.8
ruby1.9
ruby1.9.1
Show less packages