Ruby interpreter is vulnerable to the Marvin Attack. This attack allows the attacker to decrypt previously encrypted messages or forge signatures by exchanging large number of messages with the vulnerable service. The attacker needs to be able to directly or indirectly measure the time of calling to RSA::private_decrypt() or PKey::decrypt() and the error handling of those methods. Attacks over network are possible if network service can be made to perform calls to those functions with attacker controlled messages.
The issue can be workarounded by using Ruby with OpenSSL that implements implicit rejection (http://github.com/openssl/openssl/pull/13817), first included upstream in the 3.2.0 release. That feature has also been backported to: - RHEL-9.2.z: http://access.redhat.com/errata/RHSA-2024:0500 - RHEL-8.9.z: http://access.redhat.com/errata/RHSA-2023:7877 - RHEL-8.8 EUS: http://access.redhat.com/errata/RHSA-2024:0154 - RHEL-8.6 EUS: http://access.redhat.com/errata/RHSA-2024:0208