Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 28 Jul 2015 14:39:59 +0200
From: Jan Rusnacko <>
        Assign a CVE Identifier <>,
Subject: Re: CVE request: Two ruby 'dl' vulnerabilities fixed
 in ruby-1.9.1-p129

On 07/28/2015 11:44 AM, Reed Loden wrote:
> * DL::Function#call could pass tainted arguments to a C function even if
> $SAFE > 0.
Could this be related to CVE-2013-2065 ?
Jan Rusnacko, Red Hat Product Security

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ