It was discovered that Ruby RDoc incorrectly parsed certain YAML files. If a user or automated system were tricked into parsing a specially crafted .rdoc_options file, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2024-27281)
It was discovered that the Ruby regex compiler incorrectly handled certain memory operations. A remote attacker could possibly use this issue to obtain sensitive memory contents. (CVE-2024-27282)
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libruby2.7", "binary_version": "2.7.0-5ubuntu1.13" }, { "binary_name": "libruby2.7-dbgsym", "binary_version": "2.7.0-5ubuntu1.13" }, { "binary_name": "ruby2.7", "binary_version": "2.7.0-5ubuntu1.13" }, { "binary_name": "ruby2.7-dbgsym", "binary_version": "2.7.0-5ubuntu1.13" }, { "binary_name": "ruby2.7-dev", "binary_version": "2.7.0-5ubuntu1.13" }, { "binary_name": "ruby2.7-doc", "binary_version": "2.7.0-5ubuntu1.13" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libruby3.0", "binary_version": "3.0.2-7ubuntu2.6" }, { "binary_name": "libruby3.0-dbgsym", "binary_version": "3.0.2-7ubuntu2.6" }, { "binary_name": "ruby3.0", "binary_version": "3.0.2-7ubuntu2.6" }, { "binary_name": "ruby3.0-dbgsym", "binary_version": "3.0.2-7ubuntu2.6" }, { "binary_name": "ruby3.0-dev", "binary_version": "3.0.2-7ubuntu2.6" }, { "binary_name": "ruby3.0-doc", "binary_version": "3.0.2-7ubuntu2.6" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libruby3.2", "binary_version": "3.2.3-1ubuntu0.24.04.1" }, { "binary_name": "libruby3.2-dbgsym", "binary_version": "3.2.3-1ubuntu0.24.04.1" }, { "binary_name": "ruby3.2", "binary_version": "3.2.3-1ubuntu0.24.04.1" }, { "binary_name": "ruby3.2-dbgsym", "binary_version": "3.2.3-1ubuntu0.24.04.1" }, { "binary_name": "ruby3.2-dev", "binary_version": "3.2.3-1ubuntu0.24.04.1" }, { "binary_name": "ruby3.2-doc", "binary_version": "3.2.3-1ubuntu0.24.04.1" } ] }