Back to list

An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler it is possible to extract arbitrary heap data relative to the st — CVE-2024-27282

Date
Updated
Source
MSRC
Vendor
Microsoft
Threat
medium
CVSS
6.6

Summary

Advisory CVE-2024-27282. An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler it is possible to… Vendor: Microsoft. Source: MSRC. Threat: medium. CVSS 6.6. See the official…

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Read the official source

Related advisories