First published: Mon May 11 2009(Updated: )
DL::dlopen could open a library with tainted library name even if $SAFE > 0. This vulnerability affects Ruby versions 1.8, 1.9, 2.1, 2.2. Upstream patch: <a href="https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b">https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b</a> Additional information and CVE assignment: <a href="http://seclists.org/oss-sec/2015/q3/222">http://seclists.org/oss-sec/2015/q3/222</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ruby1.8 | ||
debian/ruby1.9.1 | ||
debian/ruby2.0 | ||
redhat/rh-ruby22-ruby | <0:2.2.9-19.el6 | 0:2.2.9-19.el6 |
redhat/rh-ruby22-ruby | <0:2.2.9-19.el7 | 0:2.2.9-19.el7 |
redhat/ruby | <2.0.0 | 2.0.0 |
redhat/ruby | <2.1.8 | 2.1.8 |
redhat/ruby | <2.2.4 | 2.2.4 |
Ruby | =1.8.0 | |
Ruby | =1.9.0 | |
Ruby | =1.9.2 | |
Ruby | =1.9.3 | |
Ruby | =2.0.0 | |
Ruby | =2.0.0-p195 | |
Ruby | =2.0.0-p247 | |
Ruby | =2.0.0-p353 | |
Ruby | =2.0.0-p481 | |
Ruby | =2.0.0-p576 | |
Ruby | =2.0.0-p594 | |
Ruby | =2.0.0-p598 | |
Ruby | =2.0.0-p643 | |
Ruby | =2.0.0-p645 | |
Ruby | =2.0.0-p647 | |
Ruby | =2.1.0 | |
Ruby | =2.1.1 | |
Ruby | =2.1.2 | |
Ruby | =2.1.3 | |
Ruby | =2.1.4 | |
Ruby | =2.1.5 | |
Ruby | =2.1.6 | |
Ruby | =2.1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-5147 has a severity rating that can vary based on the specific context of use within affected Ruby versions, typically categorized as moderate due to potential security implications.
To fix CVE-2009-5147, upgrade Ruby to version 2.1.8 or later, or to the patched versions specifically listed for your distribution.
CVE-2009-5147 affects Ruby versions 1.8, 1.9, 2.0, 2.1, and 2.2.
If your application uses Ruby versions 1.8, 1.9, or 2.0, it is likely vulnerable to CVE-2009-5147 unless patched.
Exploitation of CVE-2009-5147 could allow an attacker to load arbitrary libraries, potentially executing malicious code within the Ruby application.