Package "ruby3.1"

Name: ruby3.1


Interpreter of object-oriented scripting language Ruby

Latest version: 3.1.2-7ubuntu3.3
Release: mantic (23.10)
Level: security
Repository: main
Homepage: https://www.ruby-lang.org/


Download "ruby3.1"

Other versions of "ruby3.1" in Mantic

Repository Area Version
base main 3.1.2-7ubuntu3
updates main 3.1.2-7ubuntu3.3

Packages in group

Deleted packages are displayed in grey.


Version: 3.1.2-7ubuntu3.3 2024-06-26 16:07:35 UTC

  ruby3.1 (3.1.2-7ubuntu3.3) mantic-security; urgency=medium

  * SECURITY UPDATE: buffer over-read in StringIO
    - debian/patches/CVE-2024-27280.patch: fix expanding size at
      ungetc/ungetbyte in ext/stringio/stringio.c,
    - CVE-2024-27280

 -- Marc Deslauriers <email address hidden> Wed, 19 Jun 2024 10:28:10 -0400

Source diff to previous version
CVE-2024-27280 A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and unget

Version: 3.1.2-7ubuntu3.2 2024-06-17 20:07:25 UTC

  ruby3.1 (3.1.2-7ubuntu3.2) mantic-security; urgency=medium

  * SECURITY UPDATE: code execution in RDoc
    - debian/patches/CVE-2024-27281-1.patch: filter marshalled objects in
    - debian/patches/CVE-2024-27281-2.patch: fix NoMethodError for
      start_with in lib/rdoc/store.rb.
    - CVE-2024-27281
  * SECURITY UPDATE: heap data extraction via regex
    - debian/patches/CVE-2024-27282.patch: fix Use-After-Free issue for
      Regexp in regexec.c.
    - CVE-2024-27282

 -- Marc Deslauriers <email address hidden> Fri, 14 Jun 2024 07:58:00 -0400

CVE-2024-27281 An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in
CVE-2024-27282 An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitr

About   -   Send Feedback to @ubuntu_updates