It was discovered that Ruby RDoc incorrectly parsed certain YAML files. If a user or automated system were tricked into parsing a specially crafted .rdoc_options file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-27281)
It was discovered that the Ruby regex compiler incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive memory contents. (CVE-2024-27282)
{ "binaries": [ { "binary_version": "2.7.0-5ubuntu1.13", "binary_name": "libruby2.7" }, { "binary_version": "2.7.0-5ubuntu1.13", "binary_name": "ruby2.7" }, { "binary_version": "2.7.0-5ubuntu1.13", "binary_name": "ruby2.7-dev" } ], "availability": "No subscription required" }
{ "cves_map": { "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2024-27281" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2024-27282" } ], "ecosystem": "Ubuntu:20.04:LTS" } }
{ "binaries": [ { "binary_version": "3.0.2-7ubuntu2.6", "binary_name": "libruby3.0" }, { "binary_version": "3.0.2-7ubuntu2.6", "binary_name": "ruby3.0" }, { "binary_version": "3.0.2-7ubuntu2.6", "binary_name": "ruby3.0-dev" } ], "availability": "No subscription required" }
{ "cves_map": { "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2024-27281" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2024-27282" } ], "ecosystem": "Ubuntu:22.04:LTS" } }
{ "binaries": [ { "binary_version": "3.2.3-1ubuntu0.24.04.1", "binary_name": "libruby3.2" }, { "binary_version": "3.2.3-1ubuntu0.24.04.1", "binary_name": "ruby3.2" }, { "binary_version": "3.2.3-1ubuntu0.24.04.1", "binary_name": "ruby3.2-dev" } ], "availability": "No subscription required" }
{ "cves_map": { "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2024-27281" }, { "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2024-27282" } ], "ecosystem": "Ubuntu:24.04:LTS" } }