[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2012-139 --- ruby

ID: oval:org.secpod.oval:def:1601274Date: (C)2020-11-27   (M)2021-09-11
Class: PATCHFamily: unix




Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005 .

Platform:
Amazon Linux AMI
Product:
ruby
Reference:
ALAS-2012-139
CVE-2012-4466
CVE    1
CVE-2012-4466
CPE    2
cpe:/o:amazon:linux
cpe:/a:ruby:ruby

© SecPod Technologies