CVE-2013-2065 ruby1.9.1

Metadata

medium
6.4
ruby1.9.1
CVE-2013-2065
2017-06-16 19:03
ALAS-2013-229
CVE-2013-2065 ruby1.8
CVE-2013-2065
2017-04-01 19:11
2017-01-05 20:16

Description

(1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426, and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native functions, which allows context-dependent attackers to bypass intended $SAFE level restrictions.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
wheezy ruby1.9.1 1.9.3.194-8.1+deb7u1