CVE-2024-27280
ADVISORY - githubSummary
An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4.
The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value.
This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later.
We recommend to update the StringIO gem to version 3.0.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead:
- For Ruby 3.0 users: Update to
stringio3.0.1.1 - For Ruby 3.1 users: Update to
stringio3.1.0.2
You can use gem update stringio to update it. If you are using bundler, please add gem "stringio", ">= 3.0.1.2" to your Gemfile.
EPSS Score: 0.0706 (0.911)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
ADVISORY - github
ADVISORY - gitlab
ADVISORY - redhat
Buffer Over-read
NIST
CREATED
UPDATED
ADVISORY IDCVE-2024-27280
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)