{"schema_version":"1.7.2","id":"OESA-2026-2208","modified":"2026-05-09T12:30:42Z","published":"2026-05-09T12:30:42Z","upstream":["CVE-2026-41493"],"summary":"rubygem-yard security update","details":"YARD is a documentation generation tool for the Ruby programming language. It enables the user to generate consistent, usable documentation that can be exported to a number of formats very easily, and also supports extending for custom Ruby constructs such as custom class level definitions.\r\n\r\nSecurity Fix(es):\n\nYARD is a Ruby Documentation tool. Prior to version 0.9.42, a path traversal vulnerability was discovered in YARD when using yard server to serve documentation. This bug would allow unsanitized HTTP requests to access arbitrary files on the machine of a yard server host under certain conditions. This issue has been patched in version 0.9.42.(CVE-2026-41493)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"rubygem-yard","purl":"pkg:rpm/openEuler/rubygem-yard&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.9.34-3.oe2403sp3"}]}],"ecosystem_specific":{"noarch":["rubygem-yard-0.9.34-3.oe2403sp3.noarch.rpm","rubygem-yard-doc-0.9.34-3.oe2403sp3.noarch.rpm"],"src":["rubygem-yard-0.9.34-3.oe2403sp3.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2208"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-41493"}],"database_specific":{"severity":"High"}}
