First published: Mon Jun 17 2024(Updated: )
It was discovered that Ruby RDoc incorrectly parsed certain YAML files. If a user or automated system were tricked into parsing a specially crafted .rdoc_options file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-27281) It was discovered that the Ruby regex compiler incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive memory contents. (CVE-2024-27282)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libruby3.2 | <3.2.3-1ubuntu0.24.04.1 | 3.2.3-1ubuntu0.24.04.1 |
Ubuntu Ubuntu | =24.04 | |
All of | ||
ubuntu/ruby3.2 | <3.2.3-1ubuntu0.24.04.1 | 3.2.3-1ubuntu0.24.04.1 |
Ubuntu Ubuntu | =24.04 | |
All of | ||
ubuntu/libruby3.1 | <3.1.2-7ubuntu3.2 | 3.1.2-7ubuntu3.2 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/ruby3.1 | <3.1.2-7ubuntu3.2 | 3.1.2-7ubuntu3.2 |
Ubuntu Ubuntu | =23.10 | |
All of | ||
ubuntu/libruby3.0 | <3.0.2-7ubuntu2.6 | 3.0.2-7ubuntu2.6 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/ruby3.0 | <3.0.2-7ubuntu2.6 | 3.0.2-7ubuntu2.6 |
Ubuntu Ubuntu | =22.04 | |
All of | ||
ubuntu/libruby2.7 | <2.7.0-5ubuntu1.13 | 2.7.0-5ubuntu1.13 |
Ubuntu Ubuntu | =20.04 | |
All of | ||
ubuntu/ruby2.7 | <2.7.0-5ubuntu1.13 | 2.7.0-5ubuntu1.13 |
Ubuntu Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.