Search CVE reports
41 – 50 of 57 results
Some fixes available 2 of 21
RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
4 affected packages
ruby1.9.1, jruby, ruby2.0, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.9.1 | Not in release | Not in release | Not in release | Not in release |
jruby | Needs evaluation | — | Vulnerable | Vulnerable |
ruby2.0 | Not in release | Not in release | Not in release | Not in release |
ruby2.3 | Not in release | Not in release | Not in release | Not in release |
The parser_yyerror function in the UTF-8 parser in Ruby 2.4.1 allows attackers to cause a denial of service (invalid write or read) or possibly have unspecified other impact via a crafted Ruby script, related to...
3 affected packages
ruby1.9.1, ruby2.0, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.3 | — | — | — | — |
Some fixes available 4 of 5
Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
3 affected packages
ruby1.9.1, ruby2.0, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.3 | — | — | — | — |
The parse_char_class function in regparse.c in the Onigmo (aka Oniguruma-mod) regular expression library, as used in Ruby 2.4.0, allows remote attackers to cause a denial of service (deep recursion and application crash) via a...
4 affected packages
ruby1.8, ruby2.0, ruby1.9.1, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
ruby2.3 | — | — | — | — |
Some fixes available 1 of 5
DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.
6 affected packages
ruby1.8, ruby1.9.1, ruby2.0, ruby2.1, ruby2.2, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.1 | — | — | — | — |
ruby2.2 | — | — | — | — |
ruby2.3 | — | — | — | — |
Some fixes available 5 of 16
The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
7 affected packages
ruby-attr-encrypted, ruby-encryptor, ruby1.8, ruby1.9.1, ruby2.0...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby-attr-encrypted | Not affected | Not affected | Not affected | Not in release |
ruby-encryptor | Not affected | Not affected | Not affected | Not in release |
ruby1.8 | Not in release | Not in release | Not in release | Not in release |
ruby1.9.1 | Not in release | Not in release | Not in release | Not in release |
ruby2.0 | Not in release | Not in release | Not in release | Not in release |
ruby2.1 | Not in release | Not in release | Not in release | Not in release |
ruby2.3 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 2 of 4
An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length....
4 affected packages
ruby1.8, ruby1.9.1, ruby2.0, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.3 | — | — | — | — |
Some fixes available 2 of 4
Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as "retval" argument can cause arbitrary code execution.
4 affected packages
ruby1.8, ruby1.9.1, ruby2.0, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.3 | — | — | — | — |
Some fixes available 1 of 6
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which...
5 affected packages
ruby1.9.1, ruby2.0, ruby2.1, ruby2.2, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.1 | — | — | — | — |
ruby2.2 | — | — | — | — |
ruby2.3 | — | — | — | — |
Some fixes available 2 of 11
verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors...
6 affected packages
ruby1.8, ruby1.9.1, ruby2.0, ruby2.1, ruby2.2, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.1 | — | — | — | — |
ruby2.2 | — | — | — | — |
ruby2.3 | — | — | — | — |