Search CVE reports
41 – 50 of 57 results
Some fixes available 4 of 5
Ruby before 2.4.2, 2.3.5, and 2.2.8 is vulnerable to a malicious format string which contains a precious specifier (*) with a huge minus value. Such situation can lead to a buffer overrun, resulting in a heap memory corruption or...
3 affected packages
ruby2.3, ruby1.9.1, ruby2.0
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby2.3 | — | — | — | Not in release |
ruby1.9.1 | — | — | — | Not in release |
ruby2.0 | — | — | — | Not in release |
Some fixes available 5 of 16
The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
7 affected packages
ruby-attr-encrypted, ruby-encryptor, ruby1.8, ruby1.9.1, ruby2.0...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby-attr-encrypted | Not affected | Not affected | Not affected | Not in release |
ruby-encryptor | Not affected | Not affected | Not affected | Not in release |
ruby1.8 | Not in release | Not in release | Not in release | Not in release |
ruby1.9.1 | Not in release | Not in release | Not in release | Not in release |
ruby2.0 | Not in release | Not in release | Not in release | Not in release |
ruby2.1 | Not in release | Not in release | Not in release | Not in release |
ruby2.3 | Not in release | Not in release | Not in release | Not in release |
Some fixes available 2 of 4
An exploitable heap overflow vulnerability exists in the Fiddle::Function.new "initialize" function functionality of Ruby. In Fiddle::Function.new "initialize" heap buffer "arg_types" allocation is made based on args array length....
4 affected packages
ruby1.8, ruby1.9.1, ruby2.0, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.3 | — | — | — | — |
An exploitable heap overflow vulnerability exists in the Psych::Emitter start_document function of Ruby. In Psych::Emitter start_document function heap buffer "head" allocation is made based on tags array length....
6 affected packages
ruby-psych, ruby1.9.1, ruby2.0, ruby2.3, ruby2.5, ruby2.7
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby-psych | — | — | — | Not affected |
ruby1.9.1 | — | — | — | Not in release |
ruby2.0 | — | — | — | Not in release |
ruby2.3 | — | — | — | Not in release |
ruby2.5 | — | — | — | Not affected |
ruby2.7 | — | — | — | Not in release |
Some fixes available 2 of 4
Type confusion exists in _cancel_eval Ruby's TclTkIp class method. Attacker passing different type of object than String as "retval" argument can cause arbitrary code execution.
4 affected packages
ruby1.8, ruby1.9.1, ruby2.0, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.3 | — | — | — | — |
Some fixes available 4 of 5
Net::SMTP in Ruby before 2.4.0 is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
3 affected packages
ruby1.9.1, ruby2.0, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.3 | — | — | — | — |
Some fixes available 1 of 6
The Fiddle::Handle implementation in ext/fiddle/handle.c in Ruby before 2.0.0-p648, 2.1 before 2.1.8, and 2.2 before 2.2.4, as distributed in Apple OS X before 10.11.4 and other products, mishandles tainting, which...
5 affected packages
ruby1.9.1, ruby2.0, ruby2.1, ruby2.2, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.1 | — | — | — | — |
ruby2.2 | — | — | — | — |
ruby2.3 | — | — | — | — |
Some fixes available 2 of 11
verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors...
6 affected packages
ruby1.8, ruby1.9.1, ruby2.0, ruby2.1, ruby2.2, ruby2.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.1 | — | — | — | — |
ruby2.2 | — | — | — | — |
ruby2.3 | — | — | — | — |
Some fixes available 8 of 12
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document...
4 affected packages
ruby1.8, ruby1.9.1, ruby2.0, ruby2.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.1 | — | — | — | — |
Some fixes available 8 of 13
The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion...
5 affected packages
ruby1.8, ruby1.9, ruby1.9.1, ruby2.0, ruby2.1
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
ruby1.8 | — | — | — | — |
ruby1.9 | — | — | — | — |
ruby1.9.1 | — | — | — | — |
ruby2.0 | — | — | — | — |
ruby2.1 | — | — | — | — |