{"id":"RHSA-2024:3500","summary":"Red Hat Security Advisory: ruby:3.0 security update","modified":"2026-04-02T10:09:01Z","published":"2024-09-16T19:17:54Z","upstream":["CVE-2021-33621","CVE-2023-28755","CVE-2023-28756","CVE-2024-27280","CVE-2024-27281","CVE-2024-27282"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:3500"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2149706"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184059"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2184061"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270749"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2270750"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2276810"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3500.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2021-33621"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2021-33621"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2021-33621"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28755"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28755"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28755"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28756"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28756"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28756"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27280"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27280"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27280"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27281"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27281"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27281"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-27282"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-27282"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-27282"},{"type":"ARTICLE","url":"https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"}],"affected":[{"package":{"name":"ruby","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"ruby-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"ruby-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"ruby-default-gems","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-default-gems"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"ruby-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"ruby-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"ruby-libs","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-libs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"ruby-libs-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/ruby-libs-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-abrt","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-abrt"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.0-1.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-abrt-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-abrt-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.4.0-1.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-bigdecimal","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bigdecimal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.0-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-bigdecimal-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bigdecimal-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.0.0-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-bundler","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-bundler"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.2.33-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-io-console","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-io-console"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-io-console-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-io-console-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-irb","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-irb"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.3.5-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-json","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-json"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.1-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-json-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-json-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.5.1-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-minitest","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-minitest"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:5.14.2-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-mysql2","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.3-2.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-mysql2-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.3-2.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-mysql2-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.3-2.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-mysql2-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-mysql2-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.5.3-2.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-pg","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.3-1.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-pg-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.3-1.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-pg-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.3-1.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-pg-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-pg-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.3-1.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-power_assert","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-power_assert"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.2.1-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-psych","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-psych"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.2-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-psych-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-psych-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.2-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-rake","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rake"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:13.0.3-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-rbs","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rbs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:1.4.0-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-rdoc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rdoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.3.4.1-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-rexml","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rexml"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.2.5-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-rss","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-rss"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.2.9-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-test-unit","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-test-unit"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.3.7-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygem-typeprof","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygem-typeprof"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:0.15.2-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygems","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygems"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.2.33-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}},{"package":{"name":"rubygems-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/rubygems-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:3.2.33-143.module+el8.10.0+21858+d19f3934"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2024:3500.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}