Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS12NWg2LWMyaHYtaHYzcs4AA6RU

StringIO buffer overread vulnerability

An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4.

The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value.

This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later.

We recommend to update the StringIO gem to version 3.0.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead:

You can use gem update stringio to update it. If you are using bundler, please add gem "stringio", ">= 3.0.1.2" to your Gemfile.

Permalink: https://github.com/advisories/GHSA-v5h6-c2hv-hv3r
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS12NWg2LWMyaHYtaHYzcs4AA6RU
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 1 month ago
Updated: about 1 month ago


Identifiers: GHSA-v5h6-c2hv-hv3r, CVE-2024-27280
References: Repository: https://github.com/ruby/stringio
Blast Radius: 0.0

Affected Packages

rubygems:stringio
Dependent packages: 19
Dependent repositories: 9,166
Downloads: 19,952,125 total
Affected Version Ranges: < 3.0.1.1
Fixed in: 3.0.1.1
All affected versions:
All unaffected versions: 0.0.1, 0.0.2, 0.1.0, 0.1.3, 0.1.4, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.1.0