diff --git a/rubies/ruby/CVE-2008-2376.yml b/rubies/ruby/CVE-2008-2376.yml index 9bcb46cad2..26f3981464 100644 --- a/rubies/ruby/CVE-2008-2376.yml +++ b/rubies/ruby/CVE-2008-2376.yml @@ -1,7 +1,8 @@ --- engine: ruby cve: 2008-2376 -url: http://www.openwall.com/lists/oss-security/2008/07/02/3 +ghsa: f7wf-fwmg-r7g3 +url: https://nvd.nist.gov/vuln/detail/CVE-2008-2376 title: More ruby integer overflows (rb_ary_fill / Array#fill) date: 2008-06-30 description: | @@ -16,3 +17,12 @@ patched_versions: - "~> 1.8.6.286" - "~> 1.8.7.71" - ">= 1.9.0" +related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2008-2376 + - https://web.archive.org/web/20211205152129/https://svn.ruby-lang.org/cgi-bin/viewvc.cgi?revision=17756&view=revision + - http://www.debian.org/security/2008/dsa-1612 + - http://www.debian.org/security/2008/dsa-1618 + - https://security.gentoo.org/glsa/200812-17 + - http://www.openwall.com/lists/oss-security/2008/07/02/3 + - https://github.com/advisories/GHSA-f7wf-fwmg-r7g3 diff --git a/rubies/ruby/CVE-2011-0188.yml b/rubies/ruby/CVE-2011-0188.yml index e4066823b8..82c885672d 100644 --- a/rubies/ruby/CVE-2011-0188.yml +++ b/rubies/ruby/CVE-2011-0188.yml @@ -1,7 +1,8 @@ --- engine: ruby cve: 2011-0188 -url: https://github.com/ruby/ruby/commit/f83651ac30c7c776dee8a6a401c654757cb8d1c2 +ghsa: 6vch-6cgr-x9c3 +url: https://nvd.nist.gov/vuln/detail/CVE-2011-0188 title: Ruby memory corruption in BigDecimal on 64bit platforms date: 2011-03-01 description: | @@ -15,3 +16,10 @@ cvss_v2: 6.8 patched_versions: - "~> 1.8.7.370" - ">= 1.9.3.preview.1" +related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-0188 + - https://github.com/ruby/ruby/commit/f83651ac30c7c776dee8a6a401c654757cb8d1c2 + - https://support.apple.com/en-us/103340 + - https://bugzilla.redhat.com/show_bug.cgi?id=682332 + - https://github.com/advisories/GHSA-6vch-6cgr-x9c3 diff --git a/rubies/ruby/CVE-2011-2686.yml b/rubies/ruby/CVE-2011-2686.yml index 6d19137e4f..cdeed3d2ff 100644 --- a/rubies/ruby/CVE-2011-2686.yml +++ b/rubies/ruby/CVE-2011-2686.yml @@ -1,7 +1,8 @@ --- engine: ruby cve: 2011-2686 -url: https://osdir.com/ml/lang-ruby-core/2011-01/msg00917.html +ghsa: g8g6-3p4h-6388 +url: https://nvd.nist.gov/vuln/detail/CVE-2011-2686 title: Ruby Random Number Generation Local Denial Of Service Vulnerability date: 2011-07-02 description: | @@ -15,3 +16,14 @@ unaffected_versions: - "< 1.8.6.399" patched_versions: - ">= 1.8.7.352" +related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-2686 + - http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released + - https://github.com/ruby/ruby/blob/v1_8_7_352/ChangeLog + - https://bugzilla.redhat.com/show_bug.cgi?id=722415 + - http://www.openwall.com/lists/oss-security/2011/07/11/1 + - http://www.openwall.com/lists/oss-security/2011/07/12/14 + - http://www.openwall.com/lists/oss-security/2011/07/20/1 + - http://www.openwall.com/lists/oss-security/2011/07/20/16 + - https://github.com/advisories/GHSA-g8g6-3p4h-6388 diff --git a/rubies/ruby/CVE-2011-2705.yml b/rubies/ruby/CVE-2011-2705.yml index a7a03d9e81..5793599d73 100644 --- a/rubies/ruby/CVE-2011-2705.yml +++ b/rubies/ruby/CVE-2011-2705.yml @@ -1,6 +1,7 @@ --- engine: ruby cve: 2011-2705 +ghsa: wj5x-c2v9-7wwr url: https://redmine.ruby-lang.org/issues/4579 title: Ruby Random Number Generation Local Denial Of Service Vulnerability date: 2011-07-02 @@ -14,3 +15,14 @@ cvss_v2: 5.0 patched_versions: - "~> 1.8.7.352" - ">= 1.9.2.290" +related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2011-2705 + - http://www.ruby-lang.org/en/news/2011/07/02/ruby-1-8-7-p352-released + - https://github.com/ruby/ruby/blob//v1_8_7_352/ChangeLog + - https://bugzilla.redhat.com/show_bug.cgi?id=722415 + - http://www.openwall.com/lists/oss-security/2011/07/12/14 + - http://www.openwall.com/lists/oss-security/2011/07/11/1 + - http://www.openwall.com/lists/oss-security/2011/07/20/1 + - http://www.openwall.com/lists/oss-security/2011/07/20/16 + - https://github.com/advisories/GHSA-wj5x-c2v9-7wwr diff --git a/rubies/ruby/CVE-2012-4466.yml b/rubies/ruby/CVE-2012-4466.yml index 1c3ac05838..301159b9c2 100644 --- a/rubies/ruby/CVE-2012-4466.yml +++ b/rubies/ruby/CVE-2012-4466.yml @@ -1,7 +1,8 @@ --- engine: ruby cve: 2012-4466 -url: https://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466/ +ghsa: gm9g-777x-3fp6 +url: https://nvd.nist.gov/vuln/detail/CVE-2012-4466 title: Ruby name_err_mesg_to_str Method Safe Level Security Bypass date: 2012-10-12 description: | @@ -14,3 +15,13 @@ cvss_v2: 5.0 patched_versions: - "~> 1.8.7.371" - ">= 1.9.3.286" +related: + url: + - https://nvd.nist.gov/vuln/detail/CVE-2012-4466 + - https://www.ruby-lang.org/en/news/2012/10/12/cve-2012-4464-cve-2012-4466 + - https://web.archive.org/web/20210120155544/https://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=37068 + - http://www.openwall.com/lists/oss-security/2012/10/02/4 + - http://www.openwall.com/lists/oss-security/2012/10/03/9 + - https://bugzilla.redhat.com/show_bug.cgi?id=862614 + - https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0294 + - https://github.com/advisories/GHSA-gm9g-777x-3fp6