An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/
Created ruby tracking bugs for this issue: Affects: fedora-38 [bug 2276811] Affects: fedora-39 [bug 2276813] Affects: fedora-40 [bug 2276814] Created ruby:3.1/ruby tracking bugs for this issue: Affects: fedora-38 [bug 2276812]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3500 https://access.redhat.com/errata/RHSA-2024:3500
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3546 https://access.redhat.com/errata/RHSA-2024:3546
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:3668 https://access.redhat.com/errata/RHSA-2024:3668
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:3670 https://access.redhat.com/errata/RHSA-2024:3670
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:3671 https://access.redhat.com/errata/RHSA-2024:3671
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:3838 https://access.redhat.com/errata/RHSA-2024:3838
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:4499 https://access.redhat.com/errata/RHSA-2024:4499