CVE-2013-2065
Publication date 2 November 2013
Last updated 24 July 2024
Ubuntu priority
(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.
Status
Package | Ubuntu Release | Status |
---|---|---|
ruby1.8 | 13.10 saucy |
Not affected
|
13.04 raring |
Not affected
|
|
12.10 quantal |
Not affected
|
|
12.04 LTS precise |
Not affected
|
|
10.04 LTS lucid | Ignored end of life | |
ruby1.9.1 | 13.10 saucy |
Fixed 1.9.3.194-8.1ubuntu2.1
|
13.04 raring |
Fixed 1.9.3.194-8.1ubuntu1.2
|
|
12.10 quantal |
Fixed 1.9.3.194-1ubuntu1.6
|
|
12.04 LTS precise |
Fixed 1.9.3.0-1ubuntu2.8
|
|
10.04 LTS lucid | Ignored end of life | |
ruby2.0 | 13.10 saucy |
Not affected
|
13.04 raring | Not in release | |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
10.04 LTS lucid | Not in release |
Notes
Patch details
Package | Patch details |
---|---|
ruby1.9.1 |
References
Related Ubuntu Security Notices (USN)
- USN-2035-1
- Ruby vulnerabilities
- 27 November 2013