First published: Thu Mar 29 2018(Updated: )
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
Credit: CVE-2017-0898 CVE-2017-10784 CVE-2017-14033 CVE-2017-14064 CVE-2017-17405 CVE-2017-17742 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780 cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | >=2.2.0<2.2.10 | |
Ruby-lang Ruby | >=2.3.0<2.3.7 | |
Ruby-lang Ruby | >=2.4.0<2.4.4 | |
Ruby-lang Ruby | >=2.5.0<2.5.1 | |
Ruby-lang Ruby | =2.6.0-preview1 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Apple macOS Mojave | <10.14.1 | 10.14.1 |
Apple High Sierra | ||
Apple Sierra | ||
Apple macOS High Sierra | <10.13.6 | 10.13.6 |
Apple El Capitan | ||
redhat/ruby | <2.2.10 | 2.2.10 |
redhat/ruby | <2.3.7 | 2.3.7 |
redhat/ruby | <2.4.4 | 2.4.4 |
redhat/ruby | <2.5.1 | 2.5.1 |
debian/ruby1.8 | ||
debian/ruby1.9.1 | ||
debian/ruby2.1 | ||
debian/ruby2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability identifier for this Ruby vulnerability is CVE-2018-8779.
CVE-2018-8779 has a severity level of high (7.5).
The affected version range of Ruby is before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1.
To fix CVE-2018-8779 in Ruby, you need to update to version 2.2.10, 2.3.7, 2.4.4, 2.5.1, or 2.6.0-preview1.
You can find more information about CVE-2018-8779 at the following references: [https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/](https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/), [https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1561957](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1561957), [https://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=62991](https://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=62991).