A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3858-1 ruby2.7 security update
Debian DSA Debian DSA DSA-5677-1 ruby3.1 security update
EUVD EUVD EUVD-2024-1008 A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2.
Github GHSA Github GHSA GHSA-v5h6-c2hv-hv3r StringIO buffer overread vulnerability
Ubuntu USN Ubuntu USN USN-6853-1 Ruby vulnerability
Ubuntu USN Ubuntu USN USN-7734-1 Ruby vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Nov 2025 03:30:00 +0900


Wed, 05 Nov 2025 02:30:00 +0900

Type Values Removed Values Added
References

Tue, 04 Nov 2025 04:30:00 +0900


Sat, 03 May 2025 08:45:00 +0900

Type Values Removed Values Added
References

Fri, 14 Feb 2025 01:15:00 +0900

Type Values Removed Values Added
First Time appeared Ruby-lang
Ruby-lang ruby
CPEs cpe:2.3:a:ruby-lang:ruby:-:*:*:*:*:*:*:*
Vendors & Products Ruby-lang
Ruby-lang ruby
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-04T17:17:47.556Z

Reserved: 2024-02-22T00:00:00.000Z

Link: CVE-2024-27280

cve-icon Vulnrichment

Updated: 2025-11-03T18:08:20.761Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-14T15:11:56.940

Modified: 2025-11-04T18:16:12.683

Link: CVE-2024-27280

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-03-21T00:00:00Z

Links: CVE-2024-27280 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses