Lucene search

K
redhatRedHatRHSA-2024:3668
HistoryJun 06, 2024 - 8:23 a.m.

(RHSA-2024:3668) Moderate: ruby:3.1 security, bug fix, and enhancement update

2024-06-0608:23:56
access.redhat.com
3
ruby scripting language
buffer overread
rce vulnerability
memory address read
security update

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High

Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.

The following packages have been upgraded to a later upstream version: ruby (3.1). (RHEL-35449)

Security Fix(es):

  • ruby: Buffer overread vulnerability in StringIO (CVE-2024-27280)

  • ruby: RCE vulnerability with .rdoc_options in RDoc (CVE-2024-27281)

  • ruby: Arbitrary memory address read vulnerability with Regex search (CVE-2024-27282)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

OSVersionArchitecturePackageVersionFilename
RedHatanyi686rubygem-json< 2.6.1-144.module+el9.4.0+21780+79b7bdb5rubygem-json-2.6.1-144.module+el9.4.0+21780+79b7bdb5.i686.rpm
RedHatanyx86_64rubygem-io-console-debuginfo< 0.5.11-144.module+el9.4.0+21780+79b7bdb5rubygem-io-console-debuginfo-0.5.11-144.module+el9.4.0+21780+79b7bdb5.x86_64.rpm
RedHatanyi686rubygem-psych-debuginfo< 4.0.4-144.module+el9.4.0+21780+79b7bdb5rubygem-psych-debuginfo-4.0.4-144.module+el9.4.0+21780+79b7bdb5.i686.rpm
RedHatanyi686ruby-devel< 3.1.5-144.module+el9.4.0+21780+79b7bdb5ruby-devel-3.1.5-144.module+el9.4.0+21780+79b7bdb5.i686.rpm
RedHatanyx86_64ruby-debugsource< 3.1.5-144.module+el9.4.0+21780+79b7bdb5ruby-debugsource-3.1.5-144.module+el9.4.0+21780+79b7bdb5.x86_64.rpm
RedHatanys390xrubygem-io-console-debuginfo< 0.5.11-144.module+el9.4.0+21780+79b7bdb5rubygem-io-console-debuginfo-0.5.11-144.module+el9.4.0+21780+79b7bdb5.s390x.rpm
RedHatanyaarch64rubygem-psych-debuginfo< 4.0.4-144.module+el9.4.0+21780+79b7bdb5rubygem-psych-debuginfo-4.0.4-144.module+el9.4.0+21780+79b7bdb5.aarch64.rpm
RedHatanyppc64lerubygem-rbs-debuginfo< 2.7.0-144.module+el9.4.0+21780+79b7bdb5rubygem-rbs-debuginfo-2.7.0-144.module+el9.4.0+21780+79b7bdb5.ppc64le.rpm
RedHatanyi686ruby-libs-debuginfo< 3.1.5-144.module+el9.4.0+21780+79b7bdb5ruby-libs-debuginfo-3.1.5-144.module+el9.4.0+21780+79b7bdb5.i686.rpm
RedHatanyx86_64rubygem-io-console< 0.5.11-144.module+el9.4.0+21780+79b7bdb5rubygem-io-console-0.5.11-144.module+el9.4.0+21780+79b7bdb5.x86_64.rpm
Rows per page:
1-10 of 1301

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7

Confidence

High