Control: tag -1 pending

Hello,

Bug #1069968 in ruby reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/ruby-team/ruby/-/commit/2a4748cd80f9db3c66f9cc47c9adac0e57298144

------------------------------------------------------------------------
Import Debian changes 2.5.5-3+deb10u7

ruby2.5 (2.5.5-3+deb10u7) buster-security; urgency=high
.
  * Non-maintainer upload by the ELTS Security Team.
  * Fix testsuite
    * Update test certificates.
    * Update tests for new tzdata.
    * Update tests for Git CVE 2022-39253.
    * Backport assert_linear_performance.
    * Add missing test for CVE 2023-28756.
    * Fix flaky test in io_console.
    * Exclude CI-breaking test TestProcess#test_popen_exit.
    * Exclude flaky test TestRDocMarkupPreProcess#test_class_post_process.
    * Exclude flaky test TestTime#test_strftime_no_hidden_garbage.
  * CVE-2023-36617: follow-up fix for CVE-2023-28755.
  * CVE-2024-27280: a buffer-overread issue was discovered in
    StringIO. The ungetbyte and ungetc methods on a StringIO can read past
    the end of a string, and a subsequent call to StringIO.gets may return
    the memory value. (Closes: #1069966)
  * CVE-2024-27281: when parsing .rdoc_options (used for configuration in
    RDoc) as a YAML file, object injection and resultant remote code
    execution are possible because there are no restrictions on the
    classes that can be restored. (When loading the documentation cache,
    object injection and resultant remote code execution are also possible
    if there were a crafted cache.) (Closes: #1067802)
  * CVE-2024-27282: if attacker-supplied data is provided to the Ruby
    regex compiler, it is possible to extract arbitrary heap data relative
    to the start of the text, including pointers and sensitive strings.
    (Closes: #1069968)
  * Fix lintian error: drop obsolete override.
------------------------------------------------------------------------

(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/1069968

Reply via email to