Mandriva Linux Security Advisory - A format string vulnerability in Ruby-GNOME 2 0.16.0, and SVN versions before 20071127, allows context-dependent attackers to execute arbitrary code via format string specifiers in the message parameter.
2ff38bcae8dba05ff9550a679650ffd86f4260bbc2cb5cafbda56a273ba633e6
Debian Security Advisory 1431-1 - It was discovered that ruby-gnome2, GNOME-related bindings for the Ruby language, didn't properly sanitize input prior to constructing dialogs. This could allow for the execution of arbitrary code if untrusted input is displayed within a dialog.
3782ef5adff4e9abf9331c5d5ae8547f5e69d97268d1ecd8b804cfa8f75455d4
Gentoo Linux Security Advisory GLSA 200712-09 - Chris Rohlf discovered that the Gtk::MessageDialog.new() method in the file gtk/src/rbgtkmessagedialog.c does not properly sanitize the message parameter before passing it to the gtk_message_dialog_new() function. Versions less than 0.16.0-r2 are affected.
ffb2936b579cd2aa8178252e8e6b3874b6fbaa928e8a4e53931190abf2b4a7d8