{"id":"UBUNTU-CVE-2024-27282","details":"An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.","modified":"2026-03-31T17:56:25.903029Z","published":"2024-05-14T15:11:00Z","related":["USN-6838-1","USN-7734-1"],"upstream":["CVE-2024-27282"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-27282"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2024-27282"},{"type":"REPORT","url":"https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/"},{"type":"REPORT","url":"https://github.com/ruby/ruby/commit/989a2355808a63fc45367785c82ffd46d18c900a"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6838-1"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7734-1"}],"affected":[{"package":{"name":"jruby","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/jruby@1.5.6-9+deb8u2build0.14.04.1~esm2?arch=source&distro=esm-infra-legacy/trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.5.6-5ubuntu1","1.5.6-6","1.5.6-7","1.5.6-9+deb8u2build0.14.04.1~esm2"],"ecosystem_specific":{"binaries":[{"binary_name":"jruby","binary_version":"1.5.6-9+deb8u2build0.14.04.1~esm2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}},{"package":{"name":"ruby2.3","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/ruby2.3@2.3.1-2~ubuntu16.04.16+esm12?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.3.0-1","2.3.0-2","2.3.0-4ubuntu2","2.3.0-4ubuntu3","2.3.0-5ubuntu1","2.3.1-2~16.04","2.3.1-2~16.04.2","2.3.1-2~16.04.4","2.3.1-2~16.04.5","2.3.1-2~16.04.6","2.3.1-2~16.04.7","2.3.1-2~16.04.9","2.3.1-2~16.04.10","2.3.1-2~16.04.11","2.3.1-2~16.04.12","2.3.1-2~ubuntu16.04.13","2.3.1-2~ubuntu16.04.14","2.3.1-2~ubuntu16.04.15","2.3.1-2~ubuntu16.04.16","2.3.1-2~ubuntu16.04.16+esm1","2.3.1-2~ubuntu16.04.16+esm2","2.3.1-2~ubuntu16.04.16+esm3","2.3.1-2~ubuntu16.04.16+esm4","2.3.1-2~ubuntu16.04.16+esm5","2.3.1-2~ubuntu16.04.16+esm6","2.3.1-2~ubuntu16.04.16+esm7","2.3.1-2~ubuntu16.04.16+esm8","2.3.1-2~ubuntu16.04.16+esm9","2.3.1-2~ubuntu16.04.16+esm10","2.3.1-2~ubuntu16.04.16+esm11","2.3.1-2~ubuntu16.04.16+esm12"],"ecosystem_specific":{"binaries":[{"binary_name":"libruby2.3","binary_version":"2.3.1-2~ubuntu16.04.16+esm12"},{"binary_name":"ruby2.3","binary_version":"2.3.1-2~ubuntu16.04.16+esm12"},{"binary_name":"ruby2.3-dev","binary_version":"2.3.1-2~ubuntu16.04.16+esm12"},{"binary_name":"ruby2.3-tcltk","binary_version":"2.3.1-2~ubuntu16.04.16+esm12"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}},{"package":{"name":"jruby","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/jruby@1.7.22-1ubuntu1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.7.21-2ubuntu4","1.7.22-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"jruby","binary_version":"1.7.22-1ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}},{"package":{"name":"ruby2.5","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/ruby2.5@2.5.1-1ubuntu1.16+esm5?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.5.1-1ubuntu1.16+esm5"}]}],"versions":["2.5.0~preview1-1ubuntu2","2.5.0-4ubuntu1","2.5.0-4ubuntu4","2.5.0-5ubuntu1","2.5.0-6ubuntu1","2.5.1-1ubuntu1","2.5.1-1ubuntu1.1","2.5.1-1ubuntu1.2","2.5.1-1ubuntu1.4","2.5.1-1ubuntu1.5","2.5.1-1ubuntu1.6","2.5.1-1ubuntu1.7","2.5.1-1ubuntu1.8","2.5.1-1ubuntu1.9","2.5.1-1ubuntu1.10","2.5.1-1ubuntu1.11","2.5.1-1ubuntu1.12","2.5.1-1ubuntu1.13","2.5.1-1ubuntu1.14","2.5.1-1ubuntu1.15","2.5.1-1ubuntu1.16","2.5.1-1ubuntu1.16+esm1","2.5.1-1ubuntu1.16+esm3","2.5.1-1ubuntu1.16+esm4"],"ecosystem_specific":{"binaries":[{"binary_name":"libruby2.5","binary_version":"2.5.1-1ubuntu1.16+esm5"},{"binary_name":"ruby2.5","binary_version":"2.5.1-1ubuntu1.16+esm5"},{"binary_name":"ruby2.5-dev","binary_version":"2.5.1-1ubuntu1.16+esm5"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}},{"package":{"name":"jruby","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/jruby@9.1.17.0-1~18.04?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["9.1.13.0-1","9.1.17.0-1~18.04"],"ecosystem_specific":{"binaries":[{"binary_name":"jruby","binary_version":"9.1.17.0-1~18.04"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}},{"package":{"name":"ruby2.7","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/ruby2.7@2.7.0-5ubuntu1.13?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.7.0-5ubuntu1.13"}]}],"versions":["2.7.0-1","2.7.0-2","2.7.0-3","2.7.0-4","2.7.0-4ubuntu1","2.7.0-5ubuntu1","2.7.0-5ubuntu1.1","2.7.0-5ubuntu1.2","2.7.0-5ubuntu1.3","2.7.0-5ubuntu1.4","2.7.0-5ubuntu1.5","2.7.0-5ubuntu1.6","2.7.0-5ubuntu1.7","2.7.0-5ubuntu1.8","2.7.0-5ubuntu1.9","2.7.0-5ubuntu1.10","2.7.0-5ubuntu1.11","2.7.0-5ubuntu1.12"],"ecosystem_specific":{"binaries":[{"binary_name":"libruby2.7","binary_version":"2.7.0-5ubuntu1.13"},{"binary_name":"ruby2.7","binary_version":"2.7.0-5ubuntu1.13"},{"binary_name":"ruby2.7-dev","binary_version":"2.7.0-5ubuntu1.13"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}},{"package":{"name":"jruby","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/jruby@9.1.17.0-3build6?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["9.1.17.0-3","9.1.17.0-3build5","9.1.17.0-3build6"],"ecosystem_specific":{"binaries":[{"binary_name":"jruby","binary_version":"9.1.17.0-3build6"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}},{"package":{"name":"ruby3.0","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/ruby3.0@3.0.2-7ubuntu2.6?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.0.2-7ubuntu2.6"}]}],"versions":["3.0.2-5ubuntu1","3.0.2-7","3.0.2-7ubuntu2","3.0.2-7ubuntu2.1","3.0.2-7ubuntu2.2","3.0.2-7ubuntu2.3","3.0.2-7ubuntu2.4","3.0.2-7ubuntu2.5"],"ecosystem_specific":{"binaries":[{"binary_name":"libruby3.0","binary_version":"3.0.2-7ubuntu2.6"},{"binary_name":"ruby3.0","binary_version":"3.0.2-7ubuntu2.6"},{"binary_name":"ruby3.0-dev","binary_version":"3.0.2-7ubuntu2.6"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}},{"package":{"name":"jruby","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/jruby@9.4.6.0+ds-1ubuntu3?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["9.3.9.0+ds-1","9.4.5.0+ds-1","9.4.5.0+ds-1ubuntu1","9.4.6.0+ds-1ubuntu3"],"ecosystem_specific":{"binaries":[{"binary_name":"jruby","binary_version":"9.4.6.0+ds-1ubuntu3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}},{"package":{"name":"ruby3.2","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/ruby3.2@3.2.3-1ubuntu0.24.04.1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.3-1ubuntu0.24.04.1"}]}],"versions":["3.2.3-1","3.2.3-1build2","3.2.3-1build3"],"ecosystem_specific":{"binaries":[{"binary_name":"libruby3.2","binary_version":"3.2.3-1ubuntu0.24.04.1"},{"binary_name":"ruby3.2","binary_version":"3.2.3-1ubuntu0.24.04.1"},{"binary_name":"ruby3.2-dev","binary_version":"3.2.3-1ubuntu0.24.04.1"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}},{"package":{"name":"jruby","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/jruby@9.4.8.0+ds-3ubuntu1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["9.4.8.0+ds-2ubuntu1","9.4.8.0+ds-3ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"jruby","binary_version":"9.4.8.0+ds-3ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-27282.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L"},{"type":"Ubuntu","score":"medium"}]}