csaf2cusa/cusas/r/ruby/ruby-3.0.3-133_openEuler-SA-2024-1609.json
Jia Chao 0b84f3c661 增加测试用的配置和目录
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-02 15:51:55 +08:00

14 lines
932 B
JSON

{
"id": "openEuler-SA-2024-1609",
"url": "https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1609",
"title": "An update for ruby is now available for openEuler-22.03-LTS",
"severity": "Low",
"description": "Ruby is a fast and easy interpreted scripting language for object-oriented programming. It has many functions for processing text Files and perform system management tasks (such as Perl).\r\n\r\nSecurity Fix(es):\r\n\r\nAn issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.(CVE-2024-27282)",
"cves": [
{
"id": "CVE-2024-27282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27282",
"severity": "Low"
}
]
}