Search CVE reports
21 – 30 of 62 results
CVE-2012-4522
Medium prioritySome fixes available 2 of 4
The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
ruby1.8 | — | — | — | — | — |
ruby1.9 | — | — | — | — | — |
ruby1.9.1 | — | — | — | — | — |
CVE-2012-5380
Medium priority** DISPUTED ** Untrusted search path vulnerability in the installation functionality in Ruby 1.9.3-p194, when installed in the top-level C:\ directory, might allow local users to gain privileges via a Trojan horse DLL in the...
2 affected packages
ruby1.8, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
ruby1.8 | — | — | — | — | — |
ruby1.9.1 | — | — | — | — | — |
CVE-2012-4481
Medium prioritySome fixes available 5 of 7
The safe-level feature in Ruby 1.8.7 allows context-dependent attackers to modify strings via the NameError#to_s method when operating on Ruby objects. NOTE: this issue is due to an incomplete fix for CVE-2011-1005.
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
ruby1.8 | — | — | — | — | — |
ruby1.9 | — | — | — | — | — |
ruby1.9.1 | — | — | — | — | — |
CVE-2012-4466
Medium prioritySome fixes available 7 of 8
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API...
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
ruby1.8 | — | — | — | — | — |
ruby1.9 | — | — | — | — | — |
ruby1.9.1 | — | — | — | — | — |
CVE-2012-4464
Medium prioritySome fixes available 2 of 3
Ruby 1.9.3 before patchlevel 286 and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the (1) exc_to_s or (2) name_err_to_s API function, which marks...
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
ruby1.8 | — | — | — | — | — |
ruby1.9 | — | — | — | — | — |
ruby1.9.1 | — | — | — | — | — |
CVE-2011-4815
Medium prioritySome fixes available 4 of 5
Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted...
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
ruby1.8 | — | — | — | — | — |
ruby1.9 | — | — | — | — | — |
ruby1.9.1 | — | — | — | — | — |
CVE-2011-3009
Medium priorityRuby before 1.8.6-p114 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in...
1 affected packages
ruby1.8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
ruby1.8 | — | — | — | — | — |
CVE-2011-2705
Medium prioritySome fixes available 3 of 9
The SecureRandom.random_bytes function in lib/securerandom.rb in Ruby before 1.8.7-p352 and 1.9.x before 1.9.2-p290 relies on PID values for initialization, which makes it easier for context-dependent attackers to predict the...
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
ruby1.8 | — | — | — | — | — |
ruby1.9 | — | — | — | — | — |
ruby1.9.1 | — | — | — | — | — |
CVE-2011-2686
Medium prioritySome fixes available 3 of 4
Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in...
1 affected packages
ruby1.8
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
ruby1.8 | — | — | — | — | — |
CVE-2011-0188
Low prioritySome fixes available 3 of 14
The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent...
3 affected packages
ruby1.8, ruby1.9, ruby1.9.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
ruby1.8 | — | — | — | — | — |
ruby1.9 | — | — | — | — | — |
ruby1.9.1 | — | — | — | — | — |