CVE-2024-27282
14.05.2024, 15:11
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
jruby |
| ||||||||||||||||||
ruby2.3 |
| ||||||||||||||||||
ruby2.5 |
| ||||||||||||||||||
ruby2.7 |
| ||||||||||||||||||
ruby3.0 |
| ||||||||||||||||||
ruby3.1 |
| ||||||||||||||||||
ruby3.2 |
|
Common Weakness Enumeration
References