CVE-2012-4466 ruby1.9.1

Metadata

medium
5.0
ruby1.9.1
CVE-2012-4466
2017-12-29 23:00
ALAS-2012-139
CVE-2012-4466
2017-12-29 21:03
2017-06-16 19:00
2017-04-01 19:11
2017-01-05 20:16

Description

Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
wheezy ruby1.9.1 1.9.3.194-2