Skip to content

Commit be93daf

Browse files
committed
Merge branch 'CVE-2024-27280-stringio'
2 parents 20cfcd8 + a3e1185 commit be93daf

File tree

1 file changed

+45
-0
lines changed

1 file changed

+45
-0
lines changed
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
layout: news_post
3+
title: "CVE-2024-27280: Buffer overread vulnerability in StringIO"
4+
author: "hsbt"
5+
translator:
6+
date: 2023-03-21 11:00:00 +0000
7+
tags: security
8+
lang: en
9+
---
10+
11+
We have released the StringIO gem version 3.0.1.1 and 3.0.1.2 that have a security fix for a buffer overread vulnerability.
12+
This vulnerability has been assigned the CVE identifier [CVE-2024-27280](https://www.cve.org/CVERecord?id=CVE-2024-27280).
13+
14+
## Details
15+
16+
An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4.
17+
18+
The `ungetbyte` and `ungetc` methods on a StringIO can read past the end of a string, and a subsequent call to `StringIO.gets` may return the memory value.
19+
20+
This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later.
21+
22+
## Recommended action
23+
24+
We recommend to update the StringIO gem to version 3.0.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead:
25+
26+
* For Ruby 3.0 users: Update to `stringio` 3.0.1.1
27+
* For Ruby 3.1 users: Update to `stringio` 3.0.1.2
28+
29+
Note: hat StringIO 3.0.1.2 contains not only the fix for this vulnerability but also a bugfix for [[Bug #19389]][https://github.com/ruby/ruby/commit/1d24a931c458c93463da1d5885f33edef3677cc2].
30+
31+
You can use `gem update stringio` to update it. If you are using bundler, please add `gem "stringio", ">= 3.0.1.2"` to your `Gemfile`.
32+
33+
## Affected versions
34+
35+
* Ruby 3.0.6 or lower
36+
* Ruby 3.1.4 or lower
37+
* StringIO gem 3.0.2 or lower
38+
39+
## Credits
40+
41+
Thanks to [david_h1](https://hackerone.com/david_h1?type=user) for discovering this issue.
42+
43+
## History
44+
45+
* Originally published at 2024-03-21 11:00:00 (UTC)

0 commit comments

Comments
 (0)