File tree Expand file tree Collapse file tree 5 files changed +57
-4
lines changed
Expand file tree Collapse file tree 5 files changed +57
-4
lines changed Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2008-2376
4- url : http://www.openwall.com/lists/oss-security/2008/07/02/3
4+ ghsa : f7wf-fwmg-r7g3
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2008-2376
56title : More ruby integer overflows (rb_ary_fill / Array#fill)
67date : 2008-06-30
78description : |
@@ -16,3 +17,12 @@ patched_versions:
1617 - " ~> 1.8.6.286"
1718 - " ~> 1.8.7.71"
1819 - " >= 1.9.0"
20+ related :
21+ url :
22+ - https://nvd.nist.gov/vuln/detail/CVE-2008-2376
23+ - https://web.archive.org/web/20211205152129/https://svn.ruby-lang.org/cgi-bin/viewvc.cgi?revision=17756&view=revision
24+ - http://www.debian.org/security/2008/dsa-1612
25+ - http://www.debian.org/security/2008/dsa-1618
26+ - https://security.gentoo.org/glsa/200812-17
27+ - http://www.openwall.com/lists/oss-security/2008/07/02/3
28+ - https://github.com/advisories/GHSA-f7wf-fwmg-r7g3
Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2011-0188
4- url : https://github.com/ruby/ruby/commit/f83651ac30c7c776dee8a6a401c654757cb8d1c2
4+ ghsa : 6vch-6cgr-x9c3
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2011-0188
56title : Ruby memory corruption in BigDecimal on 64bit platforms
67date : 2011-03-01
78description : |
@@ -15,3 +16,10 @@ cvss_v2: 6.8
1516patched_versions :
1617 - " ~> 1.8.7.370"
1718 - " >= 1.9.3.preview.1"
19+ related :
20+ url :
21+ - https://nvd.nist.gov/vuln/detail/CVE-2011-0188
22+ - https://github.com/ruby/ruby/commit/f83651ac30c7c776dee8a6a401c654757cb8d1c2
23+ - https://support.apple.com/en-us/103340
24+ - https://bugzilla.redhat.com/show_bug.cgi?id=682332
25+ - https://github.com/advisories/GHSA-6vch-6cgr-x9c3
Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2011-2686
4- url : https://osdir.com/ml/lang-ruby-core/2011-01/msg00917.html
4+ ghsa : g8g6-3p4h-6388
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2011-2686
56title : Ruby Random Number Generation Local Denial Of Service Vulnerability
67date : 2011-07-02
78description : |
@@ -15,3 +16,14 @@ unaffected_versions:
1516 - " < 1.8.6.399"
1617patched_versions :
1718 - " >= 1.8.7.352"
19+ related :
20+ url :
21+ - https://nvd.nist.gov/vuln/detail/CVE-2011-2686
22+ - http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released
23+ - https://github.com/ruby/ruby/blob/v1_8_7_352/ChangeLog
24+ - https://bugzilla.redhat.com/show_bug.cgi?id=722415
25+ - http://www.openwall.com/lists/oss-security/2011/07/11/1
26+ - http://www.openwall.com/lists/oss-security/2011/07/12/14
27+ - http://www.openwall.com/lists/oss-security/2011/07/20/1
28+ - http://www.openwall.com/lists/oss-security/2011/07/20/16
29+ - https://github.com/advisories/GHSA-g8g6-3p4h-6388
Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2011-2705
4+ ghsa : wj5x-c2v9-7wwr
45url : https://redmine.ruby-lang.org/issues/4579
56title : Ruby Random Number Generation Local Denial Of Service Vulnerability
67date : 2011-07-02
@@ -14,3 +15,14 @@ cvss_v2: 5.0
1415patched_versions :
1516 - " ~> 1.8.7.352"
1617 - " >= 1.9.2.290"
18+ related :
19+ url :
20+ - https://nvd.nist.gov/vuln/detail/CVE-2011-2705
21+ - http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released
22+ - https://github.com/ruby/ruby/blob//v1_8_7_352/ChangeLog
23+ - https://bugzilla.redhat.com/show_bug.cgi?id=722415
24+ - http://www.openwall.com/lists/oss-security/2011/07/12/14
25+ - http://www.openwall.com/lists/oss-security/2011/07/11/1
26+ - http://www.openwall.com/lists/oss-security/2011/07/20/1
27+ - http://www.openwall.com/lists/oss-security/2011/07/20/16
28+ - https://github.com/advisories/GHSA-wj5x-c2v9-7wwr
Original file line number Diff line number Diff line change 11---
22engine : ruby
33cve : 2012-4466
4- url : https://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/
4+ ghsa : gm9g-777x-3fp6
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2012-4466
56title : Ruby name_err_mesg_to_str Method Safe Level Security Bypass
67date : 2012-10-12
78description : |
@@ -14,3 +15,13 @@ cvss_v2: 5.0
1415patched_versions :
1516 - " ~> 1.8.7.371"
1617 - " >= 1.9.3.286"
18+ related :
19+ url :
20+ - https://nvd.nist.gov/vuln/detail/CVE-2012-4466
21+ - https://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466
22+ - https://web.archive.org/web/20210120155544/https://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068
23+ - http://www.openwall.com/lists/oss-security/2012/10/02/4
24+ - http://www.openwall.com/lists/oss-security/2012/10/03/9
25+ - https://bugzilla.redhat.com/show_bug.cgi?id=862614
26+ - https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0294
27+ - https://github.com/advisories/GHSA-gm9g-777x-3fp6
You can’t perform that action at this time.
0 commit comments