ruby-core@ruby-lang.org archive (unofficial mirror)
 help / color / mirror / Atom feed
* [ruby-core:118892] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
@ 2024-08-19  9:21 kenhys (Kentaro Hayashi) via ruby-core
  2024-08-19 10:13 ` [ruby-core:118893] " nagachika (Tomoyuki Chikanaga) via ruby-core
  2024-09-03  6:00 ` [ruby-core:119020] " hsbt (Hiroshi SHIBATA) via ruby-core
  0 siblings, 2 replies; 3+ messages in thread
From: kenhys (Kentaro Hayashi) via ruby-core @ 2024-08-19  9:21 UTC (permalink / raw)
  To: ruby-core; +Cc: kenhys (Kentaro Hayashi)

Issue #20685 has been reported by kenhys (Kentaro Hayashi).

----------------------------------------
Misc #20685: Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
https://bugs.ruby-lang.org/issues/20685

* Author: kenhys (Kentaro Hayashi)
* Status: Open
----------------------------------------
# Problem

According to https://github.com/ruby/ruby/releases/tag/v3_2_4,
it mentions "CVE-2024-27280: Buffer overread vulnerability in StringIO"
as a security fix, but https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/
explicitly describe that the following:

> This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later.

so, it is a bit strange that CVE-2023-27280 was mentioned as security fix for 3.2.x, IMHO.

Please correct me if I'm wrongly interpreted it.

# Expected

The problematic description was removed from tags and release note.

# Additional Information

* https://github.com/ruby/ruby/releases/tag/v3_2_4
  * mention it as security fix
* https://www.ruby-lang.org/ja/news/2024/04/23/ruby-3-2-4-released/
  * mention it as security fix
* https://www.ruby-lang.org/en/news/2024/04/23/ruby-3-2-4-released/
  * mention it as security fix









-- 
https://bugs.ruby-lang.org/
 ______________________________________________
 ruby-core mailing list -- ruby-core@ml.ruby-lang.org
 To unsubscribe send an email to ruby-core-leave@ml.ruby-lang.org
 ruby-core info -- https://ml.ruby-lang.org/mailman3/lists/ruby-core.ml.ruby-lang.org/

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [ruby-core:118893] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
  2024-08-19  9:21 [ruby-core:118892] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280) kenhys (Kentaro Hayashi) via ruby-core
@ 2024-08-19 10:13 ` nagachika (Tomoyuki Chikanaga) via ruby-core
  2024-09-03  6:00 ` [ruby-core:119020] " hsbt (Hiroshi SHIBATA) via ruby-core
  1 sibling, 0 replies; 3+ messages in thread
From: nagachika (Tomoyuki Chikanaga) via ruby-core @ 2024-08-19 10:13 UTC (permalink / raw)
  To: ruby-core; +Cc: nagachika (Tomoyuki Chikanaga)

Issue #20685 has been updated by nagachika (Tomoyuki Chikanaga).


Thank you for your greate catch! You are totally right. ruby-3.2 seriese contains stringio-3.0.4 from the beginning.

I remove the CVE reference in the GitHub release page now. https://github.com/ruby/ruby/releases/tag/v3_2_4

I will also remove the links in the release announce pages in www.ruby-lang.org afterward.

----------------------------------------
Misc #20685: Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
https://bugs.ruby-lang.org/issues/20685#change-109463

* Author: kenhys (Kentaro Hayashi)
* Status: Open
----------------------------------------
# Problem

According to https://github.com/ruby/ruby/releases/tag/v3_2_4,
it mentions "CVE-2024-27280: Buffer overread vulnerability in StringIO"
as a security fix, but https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/
explicitly describe that the following:

> This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later.

so, it is a bit strange that CVE-2023-27280 was mentioned as security fix for 3.2.x, IMHO.

Please correct me if I'm wrongly interpreted it.

# Expected

The problematic description was removed from tags and release note.

# Additional Information

* https://github.com/ruby/ruby/releases/tag/v3_2_4
  * mention it as security fix
* https://www.ruby-lang.org/ja/news/2024/04/23/ruby-3-2-4-released/
  * mention it as security fix
* https://www.ruby-lang.org/en/news/2024/04/23/ruby-3-2-4-released/
  * mention it as security fix









-- 
https://bugs.ruby-lang.org/
 ______________________________________________
 ruby-core mailing list -- ruby-core@ml.ruby-lang.org
 To unsubscribe send an email to ruby-core-leave@ml.ruby-lang.org
 ruby-core info -- https://ml.ruby-lang.org/mailman3/lists/ruby-core.ml.ruby-lang.org/

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [ruby-core:119020] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
  2024-08-19  9:21 [ruby-core:118892] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280) kenhys (Kentaro Hayashi) via ruby-core
  2024-08-19 10:13 ` [ruby-core:118893] " nagachika (Tomoyuki Chikanaga) via ruby-core
@ 2024-09-03  6:00 ` hsbt (Hiroshi SHIBATA) via ruby-core
  1 sibling, 0 replies; 3+ messages in thread
From: hsbt (Hiroshi SHIBATA) via ruby-core @ 2024-09-03  6:00 UTC (permalink / raw)
  To: ruby-core; +Cc: hsbt (Hiroshi SHIBATA)

Issue #20685 has been updated by hsbt (Hiroshi SHIBATA).

Status changed from Open to Closed

Removed them at https://github.com/ruby/www.ruby-lang.org/pull/3347

----------------------------------------
Misc #20685: Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
https://bugs.ruby-lang.org/issues/20685#change-109598

* Author: kenhys (Kentaro Hayashi)
* Status: Closed
----------------------------------------
# Problem

According to https://github.com/ruby/ruby/releases/tag/v3_2_4,
it mentions "CVE-2024-27280: Buffer overread vulnerability in StringIO"
as a security fix, but https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/
explicitly describe that the following:

> This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later.

so, it is a bit strange that CVE-2023-27280 was mentioned as security fix for 3.2.x, IMHO.

Please correct me if I'm wrongly interpreted it.

# Expected

The problematic description was removed from tags and release note.

# Additional Information

* https://github.com/ruby/ruby/releases/tag/v3_2_4
  * mention it as security fix
* https://www.ruby-lang.org/ja/news/2024/04/23/ruby-3-2-4-released/
  * mention it as security fix
* https://www.ruby-lang.org/en/news/2024/04/23/ruby-3-2-4-released/
  * mention it as security fix









-- 
https://bugs.ruby-lang.org/
 ______________________________________________
 ruby-core mailing list -- ruby-core@ml.ruby-lang.org
 To unsubscribe send an email to ruby-core-leave@ml.ruby-lang.org
 ruby-core info -- https://ml.ruby-lang.org/mailman3/lists/ruby-core.ml.ruby-lang.org/

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2024-09-03  6:00 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-08-19  9:21 [ruby-core:118892] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280) kenhys (Kentaro Hayashi) via ruby-core
2024-08-19 10:13 ` [ruby-core:118893] " nagachika (Tomoyuki Chikanaga) via ruby-core
2024-09-03  6:00 ` [ruby-core:119020] " hsbt (Hiroshi SHIBATA) via ruby-core

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).