CVE-2013-2065

Publication date 2 November 2013

Last updated 24 July 2024


Ubuntu priority

(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.

Read the notes from the security team

Status

Package Ubuntu Release Status
ruby1.8 13.10 saucy
Not affected
13.04 raring
Not affected
12.10 quantal
Not affected
12.04 LTS precise
Not affected
10.04 LTS lucid Ignored end of life
ruby1.9.1 13.10 saucy
Fixed 1.9.3.194-8.1ubuntu2.1
13.04 raring
Fixed 1.9.3.194-8.1ubuntu1.2
12.10 quantal
Fixed 1.9.3.194-1ubuntu1.6
12.04 LTS precise
Fixed 1.9.3.0-1ubuntu2.8
10.04 LTS lucid Ignored end of life
ruby2.0 13.10 saucy
Not affected
13.04 raring Not in release
12.10 quantal Not in release
12.04 LTS precise Not in release
10.04 LTS lucid Not in release

Notes


mdeslaur

only affects 1.9+

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
ruby1.9.1