An update for ruby is now available for openEuler-22.03-LTS-SP1
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2024-1610
Final
1.0
1.0
2024-05-17
Initial
2024-05-17
2024-05-17
openEuler SA Tool V1.0
2024-05-17
ruby security update
An update for ruby is now available for openEuler-22.03-LTS-SP1.
Ruby is a fast and easy interpreted scripting language for object-oriented programming. It has many functions for processing text Files and perform system management tasks (such as Perl).
Security Fix(es):
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.(CVE-2024-27282)
An update for ruby is now available for openEuler-22.03-LTS-SP1.
openEuler Security has rated this update as having a security impact of low. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Low
ruby
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1610
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2024-27282
https://nvd.nist.gov/vuln/detail/CVE-2024-27282
openEuler-22.03-LTS-SP1
rubygem-psych-3.3.2-133.oe2203sp1.aarch64.rpm
rubygem-io-console-0.5.7-133.oe2203sp1.aarch64.rpm
ruby-devel-3.0.3-133.oe2203sp1.aarch64.rpm
ruby-3.0.3-133.oe2203sp1.aarch64.rpm
rubygem-json-2.5.1-133.oe2203sp1.aarch64.rpm
rubygem-openssl-2.2.1-133.oe2203sp1.aarch64.rpm
ruby-debuginfo-3.0.3-133.oe2203sp1.aarch64.rpm
rubygem-bigdecimal-3.0.0-133.oe2203sp1.aarch64.rpm
ruby-debugsource-3.0.3-133.oe2203sp1.aarch64.rpm
rubygem-bundler-2.2.32-133.oe2203sp1.noarch.rpm
rubygems-3.2.32-133.oe2203sp1.noarch.rpm
rubygem-test-unit-3.3.7-133.oe2203sp1.noarch.rpm
rubygem-rbs-1.4.0-133.oe2203sp1.noarch.rpm
rubygem-minitest-5.14.2-133.oe2203sp1.noarch.rpm
rubygem-rake-13.0.3-133.oe2203sp1.noarch.rpm
rubygem-typeprof-0.15.2-133.oe2203sp1.noarch.rpm
rubygem-did_you_mean-1.5.0-133.oe2203sp1.noarch.rpm
rubygems-devel-3.2.32-133.oe2203sp1.noarch.rpm
rubygem-rdoc-6.3.3-133.oe2203sp1.noarch.rpm
rubygem-rss-0.2.9-133.oe2203sp1.noarch.rpm
ruby-help-3.0.3-133.oe2203sp1.noarch.rpm
rubygem-rexml-3.2.5-133.oe2203sp1.noarch.rpm
ruby-irb-3.0.3-133.oe2203sp1.noarch.rpm
ruby-3.0.3-133.oe2203sp1.src.rpm
ruby-3.0.3-133.oe2203sp1.x86_64.rpm
ruby-devel-3.0.3-133.oe2203sp1.x86_64.rpm
ruby-debuginfo-3.0.3-133.oe2203sp1.x86_64.rpm
ruby-debugsource-3.0.3-133.oe2203sp1.x86_64.rpm
rubygem-openssl-2.2.1-133.oe2203sp1.x86_64.rpm
rubygem-bigdecimal-3.0.0-133.oe2203sp1.x86_64.rpm
rubygem-psych-3.3.2-133.oe2203sp1.x86_64.rpm
rubygem-json-2.5.1-133.oe2203sp1.x86_64.rpm
rubygem-io-console-0.5.7-133.oe2203sp1.x86_64.rpm
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.
2024-05-17
CVE-2024-27282
openEuler-22.03-LTS-SP1
Low
3.5
AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
ruby security update
2024-05-17
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1610