CVE-2013-2065 (Object taint bypassing in DL and Fiddle in Ruby)

  • Posted December 17, 2013

  • Assessed Risk Level: Medium

DL and Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.


  • Resolved in Puppet Enterprise 3.1.0
  • PE 2.8.4 and earlier unaffected.
Puppet sites use proprietary and third-party cookies. By using our sites, you agree to our cookie policy.