First published: Thu Feb 15 2018(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ruby | <0:2.0.0.648-36.el7 | 0:2.0.0.648-36.el7 |
redhat/ruby | <0:2.0.0.648-35.el7_4 | 0:2.0.0.648-35.el7_4 |
redhat/ruby | <0:2.0.0.648-35.el7_5 | 0:2.0.0.648-35.el7_5 |
redhat/ruby | <0:2.0.0.648-36.el7_6 | 0:2.0.0.648-36.el7_6 |
redhat/rh-ruby23-ruby | <0:2.3.8-69.el6 | 0:2.3.8-69.el6 |
redhat/rh-ruby24-ruby | <0:2.4.5-91.el6 | 0:2.4.5-91.el6 |
redhat/rh-ruby23-ruby | <0:2.3.8-69.el7 | 0:2.3.8-69.el7 |
redhat/rh-ruby24-ruby | <0:2.4.5-91.el7 | 0:2.4.5-91.el7 |
redhat/rh-ruby25-ruby | <0:2.5.3-6.el7 | 0:2.5.3-6.el7 |
Rubygems Rubygems | <=2.2.9 | |
Rubygems Rubygems | <=2.3.6 | |
Rubygems Rubygems | <=2.4.3 | |
Rubygems Rubygems | <=2.5.0 | |
redhat/rubygems | <2.7.6 | 2.7.6 |
debian/jruby | 9.3.9.0+ds-8 9.4.8.0+ds-1 | |
debian/rubygems | 3.2.5-2 3.3.15-2 3.4.20-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-1000079 is a vulnerability in RubyGems that allows for directory traversal during gem installation.
The severity of CVE-2018-1000079 is medium with a CVSS score of 5.5.
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 are affected by CVE-2018-1000079.
To fix CVE-2018-1000079, update to RubyGems version 2.7.6 or later.
You can find more information about CVE-2018-1000079 on the RubyGems blog and the GitHub commits mentioned in the references.