Ruby 1.6.x up to 1.6.8, 1.8.x up to 1.8.2, and 1.9.0 development up to 2005-09-01 allows attackers to bypass safe level and taint flag protections and execute disallowed code when Ruby processes a program through standard input (stdin).
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ruby | Yukihiro_matsumoto | 1.6 (including) | 1.6 (including) |
Ruby | Yukihiro_matsumoto | 1.6.1 (including) | 1.6.1 (including) |
Ruby | Yukihiro_matsumoto | 1.6.2 (including) | 1.6.2 (including) |
Ruby | Yukihiro_matsumoto | 1.6.3 (including) | 1.6.3 (including) |
Ruby | Yukihiro_matsumoto | 1.6.4 (including) | 1.6.4 (including) |
Ruby | Yukihiro_matsumoto | 1.6.5 (including) | 1.6.5 (including) |
Ruby | Yukihiro_matsumoto | 1.6.6 (including) | 1.6.6 (including) |
Ruby | Yukihiro_matsumoto | 1.6.7 (including) | 1.6.7 (including) |
Ruby | Yukihiro_matsumoto | 1.8 (including) | 1.8 (including) |
Ruby | Yukihiro_matsumoto | 1.8.1 (including) | 1.8.1 (including) |
Ruby | Yukihiro_matsumoto | 1.8.2_pre1 (including) | 1.8.2_pre1 (including) |
Ruby | Yukihiro_matsumoto | 1.8.2_pre2 (including) | 1.8.2_pre2 (including) |
Red Hat Enterprise Linux 3 | RedHat | ruby-0:1.6.8-9.EL3.4 | * |
Red Hat Enterprise Linux 4 | RedHat | ruby-0:1.8.1-7.EL4.2 | * |
Ruby1.8 | Ubuntu | devel | * |
Ruby1.9 | Ubuntu | dapper | * |
Ruby1.9 | Ubuntu | devel | * |
Ruby1.9 | Ubuntu | edgy | * |
Ruby1.9 | Ubuntu | feisty | * |