diff --git a/en/news/_posts/2024-03-21-buffer-overread-cve-2024-27280.md b/en/news/_posts/2024-03-21-buffer-overread-cve-2024-27280.md index 0ffe5943c2..0e0bf0c4be 100644 --- a/en/news/_posts/2024-03-21-buffer-overread-cve-2024-27280.md +++ b/en/news/_posts/2024-03-21-buffer-overread-cve-2024-27280.md @@ -34,7 +34,7 @@ You can use `gem update stringio` to update it. If you are using bundler, please * Ruby 3.0.6 or lower * Ruby 3.1.4 or lower -* StringIO gem 3.0.2 or lower +* StringIO gem 3.0.1 or lower ## Credits @@ -42,4 +42,5 @@ Thanks to [david_h1](https://hackerone.com/david_h1?type=user) for discovering t ## History +* Fixed the affected version of StringIO (3.0.2 -> 3.0.1) at 2024-04-11 12:50:00 (UTC) * Originally published at 2024-03-21 4:00:00 (UTC)