First published: Wed Feb 21 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubygems Rubygems | <=2.2.9 | |
Rubygems Rubygems | <=2.3.6 | |
Rubygems Rubygems | <=2.4.3 | |
Rubygems Rubygems | <=2.5.0 | |
redhat/rubygems | <2.7.6 | 2.7.6 |
debian/jruby | 9.3.9.0+ds-8 9.4.8.0+ds-1 | |
debian/rubygems | 3.2.5-2 3.3.15-2 3.4.20-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-1000074 is medium with a severity value of 4.
RubyGems versions Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 are affected.
CVE-2018-1000074 allows an attacker to execute arbitrary code.
To fix CVE-2018-1000074, update RubyGems to version 2.7.6 or newer.
You can find more information about CVE-2018-1000074 at the following references: [http://blog.rubygems.org/2018/02/15/2.7.6-released.html](http://blog.rubygems.org/2018/02/15/2.7.6-released.html), [https://github.com/rubygems/rubygems/commit/254e3d0ee873c008c0b74e8b8abcbdab4caa0a6d](https://github.com/rubygems/rubygems/commit/254e3d0ee873c008c0b74e8b8abcbdab4caa0a6d), [https://usn.ubuntu.com/3621-1/](https://usn.ubuntu.com/3621-1/).