{ "schema_version": "1.4.0", "id": "GHSA-mmq8-m72q-qgm4", "modified": "2025-04-20T03:34:58Z", "published": "2022-05-02T04:01:41Z", "aliases": [ "CVE-2009-5147" ], "details": "DL::dlopen in Ruby 1.8, 1.9.0, 1.9.2, 1.9.3, 2.0.0 before patchlevel 648, and 2.1 before 2.1.8 opens libraries with tainted names.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-5147" }, { "type": "WEB", "url": "https://github.com/ruby/ruby/commit/4600cf725a86ce31266153647ae5aa1197b1215b" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0583" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248935" }, { "type": "WEB", "url": "https://www.ruby-lang.org/en/news/2015/12/16/unsafe-tainted-string-usage-in-fiddle-and-dl-cve-2015-7551" }, { "type": "WEB", "url": "http://seclists.org/oss-sec/2015/q3/222" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/76060" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-03-29T14:59:00Z" } }