Skip to content

Commit 040177d

Browse files
committed
Added CVE-2024-27280 for the stringio gem (issue #769).
1 parent e6ff41f commit 040177d

File tree

1 file changed

+28
-0
lines changed

1 file changed

+28
-0
lines changed

gems/stringio/CVE-2024-27280.yml

+28
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
gem: stringio
3+
cve: 2024-27280
4+
url: https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/
5+
title: Buffer overread vulnerability in StringIO
6+
date: 2024-03-21
7+
description: |
8+
An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x
9+
through 3.0.6 and 3.1.x through 3.1.4.
10+
11+
The `ungetbyte` and `ungetc` methods on a StringIO can read past the end of a
12+
string, and a subsequent call to `StringIO.gets` may return the memory value.
13+
14+
This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x
15+
and later.
16+
17+
We recommend to update the StringIO gem to version 3.0.3 or later. In order to
18+
ensure compatibility with bundled version in older Ruby series, you may update
19+
as follows instead:
20+
21+
* For Ruby 3.0 users: Update to `stringio` 3.0.1.1
22+
* For Ruby 3.1 users: Update to `stringio` 3.0.1.2
23+
24+
You can use `gem update stringio` to update it. If you are using bundler,
25+
please add `gem "stringio", ">= 3.0.1.2"` to your `Gemfile`.
26+
patched_versions:
27+
- "~> 3.0.1.1"
28+
- ">= 3.0.1.2"

0 commit comments

Comments
 (0)