CVE-2024-27282

Name
CVE-2024-27282
Description
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
cve@mitre.org https://hackerone.com/reports/2122624
cve@mitre.org https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/

Match rules

CPE URI Source package Min version Max version

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
ruby 3.19-main 3.2.4-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
ruby 3.18-main 3.2.4-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
ruby 3.17-main 3.1.5-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
ruby 3.16-main 3.1.5-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
ruby edge-main 3.3.1-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
ruby 3.20-main 3.3.1-r0 Jakub Jirutka <jakub@jirutka.cz> fixed