File: cve_2018_8779_spec.rb

package info (click to toggle)
ruby3.1 3.1.2-7%2Bdeb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 132,892 kB
  • sloc: ruby: 1,154,753; ansic: 736,782; yacc: 46,445; pascal: 10,401; sh: 3,931; cpp: 1,158; python: 838; makefile: 787; asm: 462; javascript: 382; lisp: 97; sed: 94; perl: 62; awk: 36; xml: 4
file content (30 lines) | stat: -rw-r--r-- 786 bytes parent folder | download | duplicates (7)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
require_relative '../spec_helper'

require 'socket'
require 'tempfile'

platform_is_not :windows do
  describe "CVE-2018-8779 is resisted by" do
    before :each do
      tmpfile = Tempfile.new("s")
      @path = tmpfile.path
      tmpfile.close(true)
    end

    after :each do
      File.unlink @path if @path && File.socket?(@path)
    end

    it "UNIXServer.open by raising an exception when there is a NUL byte" do
      -> {
        UNIXServer.open(@path+"\0")
      }.should raise_error(ArgumentError, /(path name|string) contains null byte/)
    end

    it "UNIXSocket.open by raising an exception when there is a NUL byte" do
      -> {
        UNIXSocket.open(@path+"\0")
      }.should raise_error(ArgumentError, /(path name|string) contains null byte/)
    end
  end
end