Search CVE reports
21 – 30 of 62 results
Some fixes available 2 of 4
The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
Some fixes available 5 of 7
The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
Some fixes available 7 of 8
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API...
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
Some fixes available 2 of 3
Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks...
3 affected packages
ruby1.9, ruby1.8, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.9 | — | — | — | — |
ruby1.8 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
Some fixes available 4 of 5
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted...
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
Ruby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in...
1 affected package
ruby1.8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
Some fixes available 3 of 9
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the...
3 affected packages
ruby1.9, ruby1.8, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.9 | — | — | — | — |
ruby1.8 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
Some fixes available 3 of 4
Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in...
1 affected package
ruby1.8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
Some fixes available 4 of 12
The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
Some fixes available 3 of 14
The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9 | — | — | — | — |
ruby1.9.1 | — | — | — | — |