Количество 28
Количество 28
ELSA-2024-3671
ELSA-2024-3671: ruby:3.3 security, bug fix, and enhancement update (MODERATE)
ELSA-2024-3670
ELSA-2024-3670: ruby:3.3 security, bug fix, and enhancement update (MODERATE)
ELSA-2024-3668
ELSA-2024-3668: ruby:3.1 security, bug fix, and enhancement update (MODERATE)
ELSA-2024-3546
ELSA-2024-3546: ruby:3.1 security, bug fix, and enhancement update (MODERATE)
ELSA-2024-4499
ELSA-2024-4499: ruby security update (MODERATE)
ELSA-2024-3838
ELSA-2024-3838: ruby security update (MODERATE)
ELSA-2024-3500
ELSA-2024-3500: ruby:3.0 security update (MODERATE)

CVE-2024-27280
A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2.

CVE-2024-27280
A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2.

CVE-2024-27280
A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2.
CVE-2024-27280
A buffer-overread issue was discovered in StringIO 3.0.1, as distribut ...
GHSA-v5h6-c2hv-hv3r
StringIO buffer overread vulnerability

BDU:2024-02456
Уязвимость методов ungetbyte и ungetc обработчика строк StringIO для языка программирования Ruby, позволяющая нарушителю оказать воздействие на конфиденциальность защищаемой информации

ROS-20250109-08
Уязвимость ruby

CVE-2024-27282
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.

CVE-2024-27282
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.

CVE-2024-27282
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.

CVE-2024-27282
CVE-2024-27282
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplie ...

CVE-2024-27281
An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.) The main fixed version is 6.6.3.1. For Ruby 3.0 users, a fixed version is rdoc 6.3.4.1. For Ruby 3.1 users, a fixed version is rdoc 6.4.1.1. For Ruby 3.2 users, a fixed version is rdoc 6.5.1.1.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2024-3671 ELSA-2024-3671: ruby:3.3 security, bug fix, and enhancement update (MODERATE) | около 1 года назад | |||
ELSA-2024-3670 ELSA-2024-3670: ruby:3.3 security, bug fix, and enhancement update (MODERATE) | около 1 года назад | |||
ELSA-2024-3668 ELSA-2024-3668: ruby:3.1 security, bug fix, and enhancement update (MODERATE) | около 1 года назад | |||
ELSA-2024-3546 ELSA-2024-3546: ruby:3.1 security, bug fix, and enhancement update (MODERATE) | около 1 года назад | |||
ELSA-2024-4499 ELSA-2024-4499: ruby security update (MODERATE) | 11 месяцев назад | |||
ELSA-2024-3838 ELSA-2024-3838: ruby security update (MODERATE) | около 1 года назад | |||
ELSA-2024-3500 ELSA-2024-3500: ruby:3.0 security update (MODERATE) | около 1 года назад | |||
![]() | CVE-2024-27280 A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2. | CVSS3: 9.8 | 2% Низкий | около 1 года назад |
![]() | CVE-2024-27280 A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2. | CVSS3: 3.1 | 2% Низкий | около 1 года назад |
![]() | CVE-2024-27280 A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2. | CVSS3: 9.8 | 2% Низкий | около 1 года назад |
CVE-2024-27280 A buffer-overread issue was discovered in StringIO 3.0.1, as distribut ... | CVSS3: 9.8 | 2% Низкий | около 1 года назад | |
GHSA-v5h6-c2hv-hv3r StringIO buffer overread vulnerability | CVSS3: 9.8 | 2% Низкий | около 1 года назад | |
![]() | BDU:2024-02456 Уязвимость методов ungetbyte и ungetc обработчика строк StringIO для языка программирования Ruby, позволяющая нарушителю оказать воздействие на конфиденциальность защищаемой информации | CVSS3: 3.1 | 2% Низкий | больше 1 года назад |
![]() | ROS-20250109-08 Уязвимость ruby | CVSS3: 3.1 | 2% Низкий | 5 месяцев назад |
![]() | CVE-2024-27282 An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1. | CVSS3: 6.6 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-27282 An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1. | CVSS3: 6.6 | 0% Низкий | около 1 года назад |
![]() | CVE-2024-27282 An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1. | CVSS3: 6.6 | 0% Низкий | около 1 года назад |
![]() | CVSS3: 6.6 | 0% Низкий | около 1 года назад | |
CVE-2024-27282 An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplie ... | CVSS3: 6.6 | 0% Низкий | около 1 года назад | |
![]() | CVE-2024-27281 An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.) The main fixed version is 6.6.3.1. For Ruby 3.0 users, a fixed version is rdoc 6.3.4.1. For Ruby 3.1 users, a fixed version is rdoc 6.4.1.1. For Ruby 3.2 users, a fixed version is rdoc 6.5.1.1. | CVSS3: 4.5 | 3% Низкий | около 1 года назад |
Уязвимостей на страницу