CVE-2005-2337
Published: 7 October 2005
Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
Priority
Status
Package | Release | Status |
---|---|---|
ruby1.8 Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
|
edgy |
Not vulnerable
|
|
feisty |
Not vulnerable
|
|
upstream |
Needs triage
|
|
ruby1.9 Launchpad, Ubuntu, Debian |
dapper |
Released
(1.9.0+20060423-3ubuntu1)
|
edgy |
Released
(1.9.0+20060423-3ubuntu1)
|
|
feisty |
Released
(1.9.0+20060423-3ubuntu1)
|
|
upstream |
Needs triage
|