First published: Thu Mar 21 2024(Updated: )
An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in ...
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rdoc | >=6.3.3<6.3.4.1 | 6.3.4.1 |
rubygems/rdoc | >=6.6.0<6.6.3.1 | 6.6.3.1 |
rubygems/rdoc | >=6.5.0<6.5.1.1 | 6.5.1.1 |
rubygems/rdoc | >=6.4.0<6.4.1.1 | 6.4.1.1 |
redhat/rdoc | <6.3.4.1 | 6.3.4.1 |
redhat/rdoc | <6.4.1.1 | 6.4.1.1 |
redhat/rdoc | <6.5.1.1 | 6.5.1.1 |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u5 |
debian/ruby3.1 | <=3.1.2-8.5 | 3.1.2-7+deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27281 has a critical severity rating due to the potential for remote code execution.
To fix CVE-2024-27281, update RDoc to version 6.3.4.1 or later for affected versions.
CVE-2024-27281 affects RDoc versions 6.3.3 through 6.6.2 distributed in Ruby 3.x through 3.3.0.
Exploitation of CVE-2024-27281 could allow attackers to perform remote code execution on affected systems.
There are no known workarounds for CVE-2024-27281, and updating is the recommended solution.