Bug 1223314 (CVE-2024-27282)

Summary: VUL-0: CVE-2024-27282: ruby3.2: arbitrary memory address read vulnerability with Regex search
Product: [Novell Products] SUSE Security Incidents Reporter: Alexander Bergmann <abergmann>
Component: IncidentsAssignee: Marcus Rückert <mrueckert>
Status: NEW --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: abergmann
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/402931/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-27282:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Alexander Bergmann 2024-04-23 15:07:53 UTC
CVE-2024-27282: Arbitrary memory address read vulnerability with Regex search

Posted by hsbt on 23 Apr 2024

We have released the Ruby version 3.0.7, 3.1.5, 3.2.4 and 3.3.1 that have a security fix for an arbitrary memory address read vulnerability in Regex search. This vulnerability has been assigned the CVE identifier CVE-2024-27282.
Details

An issue was discovered in Ruby 3.x through 3.3.0.

If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings.
Recommended action

We recommend to update the Ruby to version 3.3.1 or later. In order to ensure compatibility with older Ruby series, you may update as follows instead:

    For Ruby 3.0 users: Update to 3.0.7
    For Ruby 3.1 users: Update to 3.1.5
    For Ruby 3.2 users: Update to 3.2.4

Affected versions

    Ruby 3.0.6 or lower
    Ruby 3.1.4 or lower
    Ruby 3.2.3 or lower
    Ruby 3.3.0

Credits

Thanks to sp2ip for discovering this issue.
History

    Originally published at 2024-04-23 10:00:00 (UTC)

References:
https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/
https://www.ruby-lang.org/en/news/2024/04/23/ruby-3-0-7-released/
https://www.ruby-lang.org/en/news/2024/04/23/ruby-3-1-5-released/
https://www.ruby-lang.org/en/news/2024/04/23/ruby-3-2-4-released/
https://www.ruby-lang.org/en/news/2024/04/23/ruby-3-3-1-released/
Comment 1 OBSbugzilla Bot 2024-04-23 17:05:07 UTC
This is an autogenerated message for OBS integration:
This bug (1223314) was mentioned in
https://build.opensuse.org/request/show/1169904 Factory / ruby3.3