deivid (David Rodríguez) wrote in #note-3:
How is the score for vulnerabilities calculated? I tried to set the score myself to "Low" in the Github Advisory, because the chances that this issue is ever explored seemed very low to me. I also run a CVSS severity calculator by answering some questions and depending on the answers I gave (some of them I was not sure what the best answer was) I would get a Low or Medium score. Where does this 7.3 number come from?
In principle I totally understand that @hsbt (Hiroshi SHIBATA) doesn't plan to update it.
You can't change the score by yourself; it comes from the CVSS values.
For example, NIST and GitHub have used different values for the Attack Complexity field, which produces two different results.
https://nvd.nist.gov/vuln/detail/CVE-2021-43809
However, the point here is that ruby 2.6, which is still in the security maintenance phase, includes a vulnerable (and in EOL) package.
From my point of view, @hsbt (Hiroshi SHIBATA) should fix this by removing or upgrading it.
Or, if you prefer, you can also declare 2.6 as EOL/EOS.