From 0868ce0e1126467549f45f18b1b8fd265032e731 Mon Sep 17 00:00:00 2001 From: nagachika Date: Mon, 19 Aug 2024 20:37:54 +0900 Subject: [PATCH] Removed a unrelated CVE link that was added by mistake in ruby-3.2.4 release announces. --- es/news/_posts/2024-04-23-ruby-3-2-4-released.md | 1 - ko/news/_posts/2024-04-23-ruby-3-2-4-released.md | 1 - zh_cn/news/_posts/2024-04-23-ruby-3-2-4-released.md | 1 - zh_tw/news/_posts/2024-04-23-ruby-3-2-4-released.md | 1 - 4 files changed, 4 deletions(-) diff --git a/es/news/_posts/2024-04-23-ruby-3-2-4-released.md b/es/news/_posts/2024-04-23-ruby-3-2-4-released.md index 0a84215266..db96250759 100644 --- a/es/news/_posts/2024-04-23-ruby-3-2-4-released.md +++ b/es/news/_posts/2024-04-23-ruby-3-2-4-released.md @@ -14,7 +14,6 @@ revise detalles en los temas siguientes. * [CVE-2024-27282: Lectura de direcciones de memoria arbitrarias al buscar Regex]({%link es/news/_posts/2024-04-23-arbitrary-memory-address-read-regexp-cve-2024-27282.md %}) * [CVE-2024-27281: Vulnerabilidad RCE con .rdoc_options en RDoc](https://www.ruby-lang.org/es/news/2024/03/21/rce-rdoc-cve-2024-27281/) -* [CVE-2024-27280: Vulnerabilidad de sobre-lectura de buffer en StringIO](https://www.ruby-lang.org/es/news/2024/03/21/buffer-overread-cve-2024-27280/) Ver más detalles en la [publicación en Github](https://github.com/ruby/ruby/releases/tag/v3_2_4). diff --git a/ko/news/_posts/2024-04-23-ruby-3-2-4-released.md b/ko/news/_posts/2024-04-23-ruby-3-2-4-released.md index ef443be67c..ac30b6e203 100644 --- a/ko/news/_posts/2024-04-23-ruby-3-2-4-released.md +++ b/ko/news/_posts/2024-04-23-ruby-3-2-4-released.md @@ -14,7 +14,6 @@ Ruby 3.2.4가 릴리스되었습니다. * [CVE-2024-27282: 정규표현식 검색의 임의의 메모리 주소 읽기 취약점]({%link ko/news/_posts/2024-04-23-arbitrary-memory-address-read-regexp-cve-2024-27282.md %}) * [CVE-2024-27281: RDoc에서 .rdoc_options 사용 시의 RCE 취약점]({%link ko/news/_posts/2024-03-21-rce-rdoc-cve-2024-27281.md %}) -* [CVE-2024-27280: StringIO에서 버퍼 초과 읽기 취약점]({%link ko/news/_posts/2024-03-21-buffer-overread-cve-2024-27280.md %}) 자세한 내용은 [GitHub 릴리스](https://github.com/ruby/ruby/releases/tag/v3_2_4)를 참조하세요. diff --git a/zh_cn/news/_posts/2024-04-23-ruby-3-2-4-released.md b/zh_cn/news/_posts/2024-04-23-ruby-3-2-4-released.md index acefb845c3..dace0fbe73 100644 --- a/zh_cn/news/_posts/2024-04-23-ruby-3-2-4-released.md +++ b/zh_cn/news/_posts/2024-04-23-ruby-3-2-4-released.md @@ -14,7 +14,6 @@ Ruby 3.2.4 已发布。 * [CVE-2024-27282: Regex 搜索中的任意地址读取漏洞]({%link zh_cn/news/_posts/2024-04-23-arbitrary-memory-address-read-regexp-cve-2024-27282.md %}) * [CVE-2024-27281: RDoc 中 .rdoc_options 的 RCE 漏洞](https://www.ruby-lang.org/zh_cn/news/2024/03/21/rce-rdoc-cve-2024-27281/) -* [CVE-2024-27280: StringIO 中的缓存过读漏洞](https://www.ruby-lang.org/zh_cn/news/2024/03/21/buffer-overread-cve-2024-27280/) 您可以通过 [发布说明](https://github.com/ruby/ruby/releases/tag/v3_2_4) 获取进一步信息。 diff --git a/zh_tw/news/_posts/2024-04-23-ruby-3-2-4-released.md b/zh_tw/news/_posts/2024-04-23-ruby-3-2-4-released.md index 65b0f723bf..c55e7c0866 100644 --- a/zh_tw/news/_posts/2024-04-23-ruby-3-2-4-released.md +++ b/zh_tw/news/_posts/2024-04-23-ruby-3-2-4-released.md @@ -14,7 +14,6 @@ Ruby 3.2.4 已經發布了。 * [CVE-2024-27282: Regex 搜尋的任意記憶體位址讀取漏洞]({%link zh_tw/news/_posts/2024-04-23-arbitrary-memory-address-read-regexp-cve-2024-27282.md %}) * [CVE-2024-27281: RDoc 中 .rdoc_options 的 RCE 漏洞](https://www.ruby-lang.org/zh_tw/news/2024/03/21/rce-rdoc-cve-2024-27281/) -* [CVE-2024-27280: StringIO 中的緩衝區 overread 漏洞](https://www.ruby-lang.org/zh_tw/news/2024/03/21/buffer-overread-cve-2024-27280/) 詳細的變動請參閱 [GitHub 發布](https://github.com/ruby/ruby/releases/tag/v3_2_4)。