From 66f532bcdab8726f0d3b874a05db0cf318206b96 Mon Sep 17 00:00:00 2001 From: nagachika Date: Sun, 25 Aug 2024 12:07:47 +0900 Subject: [PATCH] Removed a unrelated CVE link that was added by mistake in ruby-3.3.1 release announces. --- en/news/_posts/2024-04-23-ruby-3-3-1-released.md | 1 - ja/news/_posts/2024-04-23-ruby-3-3-1-released.md | 1 - ko/news/_posts/2024-04-23-ruby-3-3-1-released.md | 1 - zh_cn/news/_posts/2024-04-23-ruby-3-3-1-released.md | 1 - zh_tw/news/_posts/2024-04-23-ruby-3-3-1-released.md | 1 - 5 files changed, 5 deletions(-) diff --git a/en/news/_posts/2024-04-23-ruby-3-3-1-released.md b/en/news/_posts/2024-04-23-ruby-3-3-1-released.md index 3cd8cafe15..1119d572ed 100644 --- a/en/news/_posts/2024-04-23-ruby-3-3-1-released.md +++ b/en/news/_posts/2024-04-23-ruby-3-3-1-released.md @@ -14,7 +14,6 @@ Please check the topics below for details. * [CVE-2024-27282: Arbitrary memory address read vulnerability with Regex search]({%link en/news/_posts/2024-04-23-arbitrary-memory-address-read-regexp-cve-2024-27282.md %}) * [CVE-2024-27281: RCE vulnerability with .rdoc_options in RDoc]({%link en/news/_posts/2024-03-21-rce-rdoc-cve-2024-27281.md %}) -* [CVE-2024-27280: Buffer overread vulnerability in StringIO]({%link en/news/_posts/2024-03-21-buffer-overread-cve-2024-27280.md %}) See the [GitHub releases](https://github.com/ruby/ruby/releases/tag/v3_3_1) for further details. diff --git a/ja/news/_posts/2024-04-23-ruby-3-3-1-released.md b/ja/news/_posts/2024-04-23-ruby-3-3-1-released.md index 94a32eddab..94ac592d00 100644 --- a/ja/news/_posts/2024-04-23-ruby-3-3-1-released.md +++ b/ja/news/_posts/2024-04-23-ruby-3-3-1-released.md @@ -14,7 +14,6 @@ Ruby 3.3.1 がリリースされました。 * [CVE-2024-27282: 正規表現検索における任意のメモリアドレス読み取りの脆弱性]({%link ja/news/_posts/2024-04-23-arbitrary-memory-address-read-regexp-cve-2024-27282.md %}) * [CVE-2024-27281: RDoc 内の .rdoc_options におけるRCE 脆弱性]({%link ja/news/_posts/2024-03-21-rce-rdoc-cve-2024-27281.md %}) -* [CVE-2024-27280: StringIOにおけるバッファーオーバーリード脆弱性]({%link ja/news/_posts/2024-03-21-buffer-overread-cve-2024-27280.md %}) 詳しくは [GitHub releases](https://github.com/ruby/ruby/releases/tag/v3_3_1) を参照してください。 diff --git a/ko/news/_posts/2024-04-23-ruby-3-3-1-released.md b/ko/news/_posts/2024-04-23-ruby-3-3-1-released.md index aeeec8afc6..05b4b2e137 100644 --- a/ko/news/_posts/2024-04-23-ruby-3-3-1-released.md +++ b/ko/news/_posts/2024-04-23-ruby-3-3-1-released.md @@ -14,7 +14,6 @@ Ruby 3.3.1이 릴리스되었습니다. * [CVE-2024-27282: 정규표현식 검색의 임의의 메모리 주소 읽기 취약점]({%link ko/news/_posts/2024-04-23-arbitrary-memory-address-read-regexp-cve-2024-27282.md %}) * [CVE-2024-27281: RDoc에서 .rdoc_options 사용 시의 RCE 취약점]({%link ko/news/_posts/2024-03-21-rce-rdoc-cve-2024-27281.md %}) -* [CVE-2024-27280: StringIO에서 버퍼 초과 읽기 취약점]({%link ko/news/_posts/2024-03-21-buffer-overread-cve-2024-27280.md %}) 자세한 내용은 [GitHub 릴리스](https://github.com/ruby/ruby/releases/tag/v3_3_1)를 참조하세요. diff --git a/zh_cn/news/_posts/2024-04-23-ruby-3-3-1-released.md b/zh_cn/news/_posts/2024-04-23-ruby-3-3-1-released.md index 5fbd3e8c1e..bddf2004a4 100644 --- a/zh_cn/news/_posts/2024-04-23-ruby-3-3-1-released.md +++ b/zh_cn/news/_posts/2024-04-23-ruby-3-3-1-released.md @@ -14,7 +14,6 @@ Ruby 3.3.1 已发布。 * [CVE-2024-27282: Regex 搜索中的任意地址读取漏洞]({%link zh_cn/news/_posts/2024-04-23-arbitrary-memory-address-read-regexp-cve-2024-27282.md %}) * [CVE-2024-27281: RDoc 中 .rdoc_options 的 RCE 漏洞](https://www.ruby-lang.org/zh_cn/news/2024/03/21/rce-rdoc-cve-2024-27281/) -* [CVE-2024-27280: StringIO 中的缓存过读漏洞](https://www.ruby-lang.org/zh_cn/news/2024/03/21/buffer-overread-cve-2024-27280/) 您可以通过 [发布说明](https://github.com/ruby/ruby/releases/tag/v3_3_1) 获取进一步信息。 diff --git a/zh_tw/news/_posts/2024-04-23-ruby-3-3-1-released.md b/zh_tw/news/_posts/2024-04-23-ruby-3-3-1-released.md index c126baf3b1..602a74100e 100644 --- a/zh_tw/news/_posts/2024-04-23-ruby-3-3-1-released.md +++ b/zh_tw/news/_posts/2024-04-23-ruby-3-3-1-released.md @@ -14,7 +14,6 @@ Ruby 3.3.1 已經發布了。 * [CVE-2024-27282: Regex 搜尋的任意記憶體位址讀取漏洞]({%link zh_tw/news/_posts/2024-04-23-arbitrary-memory-address-read-regexp-cve-2024-27282.md %}) * [CVE-2024-27281: RDoc 中 .rdoc_options 的 RCE 漏洞](https://www.ruby-lang.org/zh_tw/news/2024/03/21/rce-rdoc-cve-2024-27281/) -* [CVE-2024-27280: StringIO 中的緩衝區 overread 漏洞](https://www.ruby-lang.org/zh_tw/news/2024/03/21/buffer-overread-cve-2024-27280/) 詳細的變動請參閱 [GitHub 發布](https://github.com/ruby/ruby/releases/tag/v3_3_1)。