Skip to content

Commit a707f96

Browse files
postmodernRubySec CI
authored and
RubySec CI
committedMar 25, 2024·
Updated advisory posts against rubysec/ruby-advisory-db@040177d
1 parent 2cb9a86 commit a707f96

File tree

1 file changed

+35
-0
lines changed

1 file changed

+35
-0
lines changed
 
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
---
2+
layout: advisory
3+
title: 'CVE-2024-27280 (stringio): Buffer overread vulnerability in StringIO'
4+
comments: false
5+
categories:
6+
- stringio
7+
advisory:
8+
gem: stringio
9+
cve: 2024-27280
10+
url: https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/
11+
title: Buffer overread vulnerability in StringIO
12+
date: 2024-03-21
13+
description: |
14+
An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x
15+
through 3.0.6 and 3.1.x through 3.1.4.
16+
17+
The `ungetbyte` and `ungetc` methods on a StringIO can read past the end of a
18+
string, and a subsequent call to `StringIO.gets` may return the memory value.
19+
20+
This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x
21+
and later.
22+
23+
We recommend to update the StringIO gem to version 3.0.3 or later. In order to
24+
ensure compatibility with bundled version in older Ruby series, you may update
25+
as follows instead:
26+
27+
* For Ruby 3.0 users: Update to `stringio` 3.0.1.1
28+
* For Ruby 3.1 users: Update to `stringio` 3.0.1.2
29+
30+
You can use `gem update stringio` to update it. If you are using bundler,
31+
please add `gem "stringio", ">= 3.0.1.2"` to your `Gemfile`.
32+
patched_versions:
33+
- "~> 3.0.1.1"
34+
- ">= 3.0.1.2"
35+
---

0 commit comments

Comments
 (0)
Please sign in to comment.