Alpaquita LinuxStreamSecurity Advisory
Search Cve

CVE-2024-27282

Published: April 27, 2024Last modified: July 9, 2024

Description

An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.

Severity score breakdown

ParameterValue
Base score6.6
Attack VectorLOCAL
Attack complexityLOW
Privileges requiredNONE
User interactionREQUIRED
ScopeUNCHANGED
ConfidentialityHIGH
Integrity impactLOW
Availability impactLOW
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSrubyFixed (3.1.5-r0)
StreamrubyFixed (3.3.1-r0)

References

ON THIS PAGE