diff --git a/rubies/ruby/CVE-2024-27282.yml b/rubies/ruby/CVE-2024-27282.yml index d4a9f581f8..f35f36759f 100644 --- a/rubies/ruby/CVE-2024-27282.yml +++ b/rubies/ruby/CVE-2024-27282.yml @@ -1,6 +1,7 @@ --- engine: ruby cve: 2024-27282 +ghsa: 63cq-cj6g-qfr2 url: https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/ title: Arbitrary memory address read vulnerability with Regex search date: 2024-04-23 @@ -15,8 +16,19 @@ description: | * For Ruby 3.1 users: Update to 3.1.5 * For Ruby 3.2 users: Update to 3.2.4 * For Ruby 3.3 users: Update to 3.3.1 +cvss_v3: 6.6 patched_versions: - "~> 3.0.7" - "~> 3.1.5" - "~> 3.2.4" - ">= 3.3.1" +related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2024-27282 + - https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282 + - https://hackerone.com/reports/2122624 + - https://lists.debian.org/debian-lts-announce/2024/09/msg00000.html + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27LUWREIFTP3MQAW7QE4PJM4DPAQJWXF + - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XYDHPHEZI7OQXTQKTDZHGZNPIJH7ZV5N + - https://security.netapp.com/advisory/ntap-20241011-0007 + - https://github.com/advisories/GHSA-63cq-cj6g-qfr2