High severityNVD Advisory· Published Aug 26, 2012· Updated Apr 29, 2026
CVE-2012-2146
CVE-2012-2146
Description
Elixir 0.8.0 uses Blowfish in CFB mode without constructing a unique initialization vector (IV), which makes it easier for context-dependent users to obtain sensitive information and decrypt the database.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
ElixirPyPI | <= 0.7.1 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- elixir.ematia.de/trac/ticket/119nvdVendor AdvisoryWEB
- github.com/advisories/GHSA-vfcg-5ggc-3rxxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2012-2146ghsaADVISORY
- groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffanvdWEB
- www.openwall.com/lists/oss-security/2012/04/27/8nvdWEB
- www.openwall.com/lists/oss-security/2012/04/28/2nvdWEB
- www.openwall.com/lists/oss-security/2012/04/29/1nvdWEB
- bugzilla.redhat.com/show_bug.cginvdWEB
- github.com/pypa/advisory-database/tree/main/vulns/elixir/PYSEC-2012-13.yamlghsaWEB
News mentions
0No linked articles in our index yet.