vulnerability
Rocky Linux: CVE-2024-27282: ruby (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:M/Au:N/C:C/I:P/A:P) | May 14, 2024 | Jun 17, 2024 | Mar 31, 2026 |
Severity
6
CVSS
(AV:L/AC:M/Au:N/C:C/I:P/A:P)
Published
May 14, 2024
Added
Jun 17, 2024
Modified
Mar 31, 2026
Description
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.
Solutions
rocky-upgrade-rubyrocky-upgrade-ruby-bundled-gemsrocky-upgrade-ruby-bundled-gems-debuginforocky-upgrade-ruby-debuginforocky-upgrade-ruby-debugsourcerocky-upgrade-ruby-develrocky-upgrade-ruby-libsrocky-upgrade-ruby-libs-debuginforocky-upgrade-rubygem-bigdecimalrocky-upgrade-rubygem-bigdecimal-debuginforocky-upgrade-rubygem-bsonrocky-upgrade-rubygem-bson-debuginforocky-upgrade-rubygem-bson-debugsourcerocky-upgrade-rubygem-io-consolerocky-upgrade-rubygem-io-console-debuginforocky-upgrade-rubygem-jsonrocky-upgrade-rubygem-json-debuginforocky-upgrade-rubygem-mysql2rocky-upgrade-rubygem-mysql2-debuginforocky-upgrade-rubygem-mysql2-debugsourcerocky-upgrade-rubygem-opensslrocky-upgrade-rubygem-openssl-debuginforocky-upgrade-rubygem-pgrocky-upgrade-rubygem-pg-debuginforocky-upgrade-rubygem-pg-debugsourcerocky-upgrade-rubygem-psychrocky-upgrade-rubygem-psych-debuginforocky-upgrade-rubygem-raccrocky-upgrade-rubygem-racc-debuginforocky-upgrade-rubygem-rbsrocky-upgrade-rubygem-rbs-debuginfo
References
- CVE-2024-27282
- https://attackerkb.com/topics/CVE-2024-27282
- CWE-125
- EUVD-EUVD-2024-24519
- https://errata.rockylinux.org/RLSA-2024:3500
- https://errata.rockylinux.org/RLSA-2024:3546
- https://errata.rockylinux.org/RLSA-2024:3668
- https://errata.rockylinux.org/RLSA-2024:3670
- https://errata.rockylinux.org/RLSA-2024:3671
- https://errata.rockylinux.org/RLSA-2024:4499
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2024-24519
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.