CVE-2008-3655
Published: 12 August 2008
Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
Priority
Status
Package | Release | Status |
---|---|---|
ruby1.8 Launchpad, Ubuntu, Debian |
dapper |
Released
(1.8.4-1ubuntu1.6)
|
feisty |
Released
(1.8.5-4ubuntu2.3)
|
|
gutsy |
Released
(1.8.6.36-1ubuntu3.3)
|
|
hardy |
Released
(1.8.6.111-2ubuntu1.2)
|
|
intrepid |
Not vulnerable
(1.8.7.72-1)
|
|
jaunty |
Not vulnerable
(1.8.7.72-1)
|
|
karmic |
Not vulnerable
(1.8.7.72-1)
|
|
lucid |
Not vulnerable
(1.8.7.72-1)
|
|
maverick |
Not vulnerable
(1.8.7.72-1)
|
|
natty |
Not vulnerable
(1.8.7.72-1)
|
|
oneiric |
Not vulnerable
(1.8.7.72-1)
|
|
upstream |
Released
(1.8.7.72-1)
|
|
ruby1.9 Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
feisty |
Ignored
(end of life, was needed)
|
|
gutsy |
Ignored
(end of life, was needed)
|
|
hardy |
Ignored
(end of life)
|
|
intrepid |
Released
(1.9.0.2-7)
|
|
jaunty |
Released
(1.9.0.2-7)
|
|
karmic |
Released
(1.9.0.2-7)
|
|
lucid |
Released
(1.9.0.2-7)
|
|
maverick |
Does not exist
(pulled 2010-07-27)
|
|
natty |
Does not exist
(pulled 2010-07-27)
|
|
oneiric |
Does not exist
(pulled 2010-07-27)
|
|
upstream |
Released
(1.9.0.2-7)
|