On Mon, Jun 30, 2008 at 13:53, Bill Kelly <billk / cts.com> wrote:
> Tried on:
>
> ruby 1.8.6 (2008-06-30 patchlevel 256) [i686-linux]
> ruby 1.8.6 (2008-06-30 patchlevel 256) [x86_64-linux]
> ruby 1.8.6 (2008-06-30 patchlevel 256) [i386-mswin32_71]
>
> ...all good.

I guess the vulnerability announcement should be updated with links to
a working patchlevel...

http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/