Sha256: 31c7f4c736e70ecfc2b986afbc72d4c76224d0028c6d94bd6f92164db7659c8d

Contents?: true

Size: 710 Bytes

Versions: 6

Compression:

Stored size: 710 Bytes

Contents

---
engine: ruby
cve: 2015-7551
url: https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551/
title: Unsafe tainted string usage in Fiddle and DL
date: 2015-12-16
description: |
  There is an unsafe tainted string vulnerability in Fiddle and DL. This issue was
  originally reported and fixed with CVE-2009-5147 in DL, but reappeared after DL
  was reimplemented using Fiddle and libffi.
  And, about DL, CVE-2009-5147 was fixed at Ruby 1.9.1, but not fixed at other
  branches, then rubies which bundled DL except Ruby 1.9.1 are still vulnerable.
patched_versions:
  - ~> 2.0.0.648
  - ~> 2.1.8
  - ~> 2.2.4
  - ">= 2.3.0"
unaffected_versions:
  - ~> 1.9.1.129

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml
bundler-budit-0.6.2 data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml
bundler-budit-0.6.1 data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml
bundler-audit-0.6.1 data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml
bundler-audit-0.6.0 data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml
bundler-audit-0.5.0 data/ruby-advisory-db/rubies/ruby/CVE-2015-7551.yml