An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler it is possible to extract arbitrary heap data relative to the st — CVE-2024-27282
Date
Updated
Source
MSRC
MSRC
Vendor
Microsoft
Microsoft
Threat
medium
medium
CVSS
6.6
6.6
Summary
Advisory CVE-2024-27282. An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler it is possible to… Vendor: Microsoft. Source: MSRC. Threat: medium. CVSS 6.6. See the official…
What to do
General, cautious steps (verify details in the official source):
- Review exposure and plan remediation based on risk and environment.
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.