First published: Fri May 13 2011(Updated: )
The sqlite3-ruby gem in the rubygem-sqlite3 package before 1.2.4-0.5.1 in SUSE Linux Enterprise (SLE) 11 SP1 uses weak permissions for unspecified files, which allows local users to gain privileges via unknown vectors.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/sqlite3-ruby | <1.2.4 | 1.2.4 |
ruby gem sqlite3 | <=1.2.3 | |
ruby gem sqlite3 | =1.2.0 | |
ruby gem sqlite3 | =1.2.1 | |
ruby gem sqlite3 | =1.2.2 | |
SUSE Linux Enterprise | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0995 is considered a medium severity vulnerability due to its potential for privilege escalation by local users.
To fix CVE-2011-0995, upgrade the sqlite3-ruby gem to version 1.2.4 or higher.
CVE-2011-0995 affects local users on systems running vulnerable versions of the rubygem-sqlite3 package prior to 1.2.4.
CVE-2011-0995 impacts SUSE Linux Enterprise 11 SP1 and its use of sqlite3-ruby versions prior to 1.2.4.
CVE-2011-0995 involves unspecified files that have weak permissions, allowing for privilege escalation.