An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied
data is provided to the Ruby regex compiler, it is possible to extract
arbitrary heap data relative to the start of the text, including pointers
and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and
3.3.1.
Author | Note |
---|---|
mdeslaur | This also affects 2.x |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 20.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 23.10 | noarch | jruby | < any | UNKNOWN |
ubuntu | 24.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 14.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 16.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 16.04 | noarch | ruby2.3 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | ruby2.5 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | ruby2.7 | < 2.7.0-5ubuntu1.13 | UNKNOWN |
ubuntu | 22.04 | noarch | ruby3.0 | < 3.0.2-7ubuntu2.6 | UNKNOWN |
github.com/ruby/ruby/commit/989a2355808a63fc45367785c82ffd46d18c900a
launchpad.net/bugs/cve/CVE-2024-27282
nvd.nist.gov/vuln/detail/CVE-2024-27282
security-tracker.debian.org/tracker/CVE-2024-27282
ubuntu.com/security/notices/USN-6838-1
www.cve.org/CVERecord?id=CVE-2024-27282
www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/