CVE-2024-27282: Arbitrary memory address read vulnerability with Regex search

Posted by hsbt on 23 Apr 2024

We have released the Ruby version 3.0.7, 3.1.5, 3.2.4 and 3.3.1 that have a security fix for an arbitrary memory address read vulnerability in Regex search. This vulnerability has been assigned the CVE identifier CVE-2024-27282.

Details

An issue was discovered in Ruby 3.x through 3.3.0.

If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.

We recommend to update the Ruby to version 3.3.1 or later. In order to ensure compatibility with older Ruby series, you may update as follows instead:

  • For Ruby 3.0 users: Update to 3.0.7
  • For Ruby 3.1 users: Update to 3.1.5
  • For Ruby 3.2 users: Update to 3.2.4
  • For Ruby 3.3 users: Update to 3.3.1

Affected versions

  • Ruby 3.0.6 or lower
  • Ruby 3.1.4 or lower
  • Ruby 3.2.3 or lower
  • Ruby 3.3.0

Credits

Thanks to sp2ip for discovering this issue.

History

  • Originally published at 2024-04-23 10:00:00 (UTC)

Recent News

Ruby 3.2.11 Released

Ruby 3.2.11 has been released. This release includes an update to the zlib gem addressing CVE-2026-27820.

Posted by hsbt on 27 Mar 2026

Ruby 3.3.11 Released

Ruby 3.3.11 has been released. This release includes an update to the zlib gem addressing CVE-2026-27820, along with some bug fixes.

Posted by hsbt on 26 Mar 2026

More News...