{"affected":[{"ecosystem_specific":{"binaries":[{"libruby3_2-3_2":"3.2.1-1.1","ruby3.2":"3.2.1-1.1","ruby3.2-devel":"3.2.1-1.1","ruby3.2-devel-extra":"3.2.1-1.1","ruby3.2-doc":"3.2.1-1.1","ruby3.2-doc-ri":"3.2.1-1.1"}]},"package":{"ecosystem":"openSUSE:Tumbleweed","name":"ruby3.2","purl":"pkg:rpm/opensuse/ruby3.2&distro=openSUSE%20Tumbleweed"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.2.1-1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"These are all security issues fixed in the libruby3_2-3_2-3.2.1-1.1 package on the GA media of openSUSE Tumbleweed.","id":"openSUSE-SU-2024:17323","modified":"2024-06-15T00:00:00Z","published":"2024-06-15T00:00:00Z","references":[{"type":"ADVISORY","url":null},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-10663"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-10933"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-28965"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-31799"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-31810"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-32066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-41816"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-41817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-41819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-28738"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-28739"}],"related":["CVE-2020-10663","CVE-2020-10933","CVE-2021-28965","CVE-2021-31799","CVE-2021-31810","CVE-2021-32066","CVE-2021-41816","CVE-2021-41817","CVE-2021-41819","CVE-2022-28738","CVE-2022-28739"],"summary":"libruby3_2-3_2-3.2.1-1.1 on GA media","upstream":["CVE-2020-10663","CVE-2020-10933","CVE-2021-28965","CVE-2021-31799","CVE-2021-31810","CVE-2021-32066","CVE-2021-41816","CVE-2021-41817","CVE-2021-41819","CVE-2022-28738","CVE-2022-28739"]}