[RUBYSEC:STRINGIO-2024-27280] Buffer overread vulnerability in StringIO

Severity Critical
Affected Packages 1
Fixed Packages 1
CVEs 1

An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x
through 3.0.6 and 3.1.x through 3.1.4.

The ungetbyte and ungetc methods on a StringIO can read past the end of a
string, and a subsequent call to StringIO.gets may return the memory value.

This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x
and later.

We recommend to update the StringIO gem to version 3.0.3 or later. In order to
ensure compatibility with bundled version in older Ruby series, you may update
as follows instead:

  • For Ruby 3.0 users: Update to stringio 3.0.1.1
  • For Ruby 3.1 users: Update to stringio 3.0.1.2

You can use gem update stringio to update it. If you are using bundler,
please add gem "stringio", ">= 3.0.1.2" to your Gemfile.

Package Affected Version
pkg:gem/stringio < 3.0.1.1
Package Fixed Version
pkg:gem/stringio >= 3.0.1.1
Source # ID Name URL
Security Advisory GHSA-v5h6-c2hv-hv3r https://github.com/advisories/GHSA-v5h6-c2hv-hv3r
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Fixed pkg:gem/stringio stringio >= 3.0.1.1
Affected pkg:gem/stringio stringio < 3.0.1.1
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...