First published: Wed Oct 03 2012(Updated: )
Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ruby | <1.9.3 | 1.9.3 |
redhat/ruby | <1.8.7 | 1.8.7 |
Ruby-lang Ruby | =1.8.7 | |
Ruby-lang Ruby | =1.8.7-p160 | |
Ruby-lang Ruby | =1.8.7-p17 | |
Ruby-lang Ruby | =1.8.7-p173 | |
Ruby-lang Ruby | =1.8.7-p174 | |
Ruby-lang Ruby | =1.8.7-p22 | |
Ruby-lang Ruby | =1.8.7-p248 | |
Ruby-lang Ruby | =1.8.7-p249 | |
Ruby-lang Ruby | =1.8.7-p299 | |
Ruby-lang Ruby | =1.8.7-p301 | |
Ruby-lang Ruby | =1.8.7-p302 | |
Ruby-lang Ruby | =1.8.7-p330 | |
Ruby-lang Ruby | =1.8.7-p334 | |
Ruby-lang Ruby | =1.8.7-p352 | |
Ruby-lang Ruby | =1.8.7-p357 | |
Ruby-lang Ruby | =1.8.7-p358 | |
Ruby-lang Ruby | =1.8.7-p370 | |
Ruby-lang Ruby | =1.8.7-p71 | |
Ruby-lang Ruby | =1.8.7-p72 | |
Ruby-lang Ruby | =1.8.7-preview1 | |
Ruby-lang Ruby | =1.8.7-preview2 | |
Ruby-lang Ruby | =1.8.7-preview3 | |
Ruby-lang Ruby | =1.8.7-preview4 | |
Ruby-lang Ruby | =1.9.3 | |
Ruby-lang Ruby | =1.9.3-p0 | |
Ruby-lang Ruby | =1.9.3-p125 | |
Ruby-lang Ruby | =1.9.3-p194 | |
Ruby-lang Ruby | =2.0 | |
Ruby-lang Ruby | =2.0.0 | |
Ruby-lang Ruby | =2.0.0-p0 | |
Ruby-lang Ruby | =2.0.0-preview1 | |
Ruby-lang Ruby | =2.0.0-preview2 | |
Ruby-lang Ruby | =2.0.0-rc1 | |
Ruby-lang Ruby | =2.0.0-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.