* [ruby-core:118892] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
@ 2024-08-19 9:21 kenhys (Kentaro Hayashi) via ruby-core
2024-08-19 10:13 ` [ruby-core:118893] " nagachika (Tomoyuki Chikanaga) via ruby-core
2024-09-03 6:00 ` [ruby-core:119020] " hsbt (Hiroshi SHIBATA) via ruby-core
0 siblings, 2 replies; 3+ messages in thread
From: kenhys (Kentaro Hayashi) via ruby-core @ 2024-08-19 9:21 UTC (permalink / raw)
To: ruby-core; +Cc: kenhys (Kentaro Hayashi)
Issue #20685 has been reported by kenhys (Kentaro Hayashi).
----------------------------------------
Misc #20685: Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
https://bugs.ruby-lang.org/issues/20685
* Author: kenhys (Kentaro Hayashi)
* Status: Open
----------------------------------------
# Problem
According to https://github.com/ruby/ruby/releases/tag/v3_2_4,
it mentions "CVE-2024-27280: Buffer overread vulnerability in StringIO"
as a security fix, but https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/
explicitly describe that the following:
> This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later.
so, it is a bit strange that CVE-2023-27280 was mentioned as security fix for 3.2.x, IMHO.
Please correct me if I'm wrongly interpreted it.
# Expected
The problematic description was removed from tags and release note.
# Additional Information
* https://github.com/ruby/ruby/releases/tag/v3_2_4
* mention it as security fix
* https://www.ruby-lang.org/ja/news/2024/04/23/ruby-3-2-4-released/
* mention it as security fix
* https://www.ruby-lang.org/en/news/2024/04/23/ruby-3-2-4-released/
* mention it as security fix
--
https://bugs.ruby-lang.org/
______________________________________________
ruby-core mailing list -- ruby-core@ml.ruby-lang.org
To unsubscribe send an email to ruby-core-leave@ml.ruby-lang.org
ruby-core info -- https://ml.ruby-lang.org/mailman3/lists/ruby-core.ml.ruby-lang.org/
^ permalink raw reply [flat|nested] 3+ messages in thread
* [ruby-core:118893] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
2024-08-19 9:21 [ruby-core:118892] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280) kenhys (Kentaro Hayashi) via ruby-core
@ 2024-08-19 10:13 ` nagachika (Tomoyuki Chikanaga) via ruby-core
2024-09-03 6:00 ` [ruby-core:119020] " hsbt (Hiroshi SHIBATA) via ruby-core
1 sibling, 0 replies; 3+ messages in thread
From: nagachika (Tomoyuki Chikanaga) via ruby-core @ 2024-08-19 10:13 UTC (permalink / raw)
To: ruby-core; +Cc: nagachika (Tomoyuki Chikanaga)
Issue #20685 has been updated by nagachika (Tomoyuki Chikanaga).
Thank you for your greate catch! You are totally right. ruby-3.2 seriese contains stringio-3.0.4 from the beginning.
I remove the CVE reference in the GitHub release page now. https://github.com/ruby/ruby/releases/tag/v3_2_4
I will also remove the links in the release announce pages in www.ruby-lang.org afterward.
----------------------------------------
Misc #20685: Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
https://bugs.ruby-lang.org/issues/20685#change-109463
* Author: kenhys (Kentaro Hayashi)
* Status: Open
----------------------------------------
# Problem
According to https://github.com/ruby/ruby/releases/tag/v3_2_4,
it mentions "CVE-2024-27280: Buffer overread vulnerability in StringIO"
as a security fix, but https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/
explicitly describe that the following:
> This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later.
so, it is a bit strange that CVE-2023-27280 was mentioned as security fix for 3.2.x, IMHO.
Please correct me if I'm wrongly interpreted it.
# Expected
The problematic description was removed from tags and release note.
# Additional Information
* https://github.com/ruby/ruby/releases/tag/v3_2_4
* mention it as security fix
* https://www.ruby-lang.org/ja/news/2024/04/23/ruby-3-2-4-released/
* mention it as security fix
* https://www.ruby-lang.org/en/news/2024/04/23/ruby-3-2-4-released/
* mention it as security fix
--
https://bugs.ruby-lang.org/
______________________________________________
ruby-core mailing list -- ruby-core@ml.ruby-lang.org
To unsubscribe send an email to ruby-core-leave@ml.ruby-lang.org
ruby-core info -- https://ml.ruby-lang.org/mailman3/lists/ruby-core.ml.ruby-lang.org/
^ permalink raw reply [flat|nested] 3+ messages in thread
* [ruby-core:119020] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
2024-08-19 9:21 [ruby-core:118892] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280) kenhys (Kentaro Hayashi) via ruby-core
2024-08-19 10:13 ` [ruby-core:118893] " nagachika (Tomoyuki Chikanaga) via ruby-core
@ 2024-09-03 6:00 ` hsbt (Hiroshi SHIBATA) via ruby-core
1 sibling, 0 replies; 3+ messages in thread
From: hsbt (Hiroshi SHIBATA) via ruby-core @ 2024-09-03 6:00 UTC (permalink / raw)
To: ruby-core; +Cc: hsbt (Hiroshi SHIBATA)
Issue #20685 has been updated by hsbt (Hiroshi SHIBATA).
Status changed from Open to Closed
Removed them at https://github.com/ruby/www.ruby-lang.org/pull/3347
----------------------------------------
Misc #20685: Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280)
https://bugs.ruby-lang.org/issues/20685#change-109598
* Author: kenhys (Kentaro Hayashi)
* Status: Closed
----------------------------------------
# Problem
According to https://github.com/ruby/ruby/releases/tag/v3_2_4,
it mentions "CVE-2024-27280: Buffer overread vulnerability in StringIO"
as a security fix, but https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/
explicitly describe that the following:
> This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later.
so, it is a bit strange that CVE-2023-27280 was mentioned as security fix for 3.2.x, IMHO.
Please correct me if I'm wrongly interpreted it.
# Expected
The problematic description was removed from tags and release note.
# Additional Information
* https://github.com/ruby/ruby/releases/tag/v3_2_4
* mention it as security fix
* https://www.ruby-lang.org/ja/news/2024/04/23/ruby-3-2-4-released/
* mention it as security fix
* https://www.ruby-lang.org/en/news/2024/04/23/ruby-3-2-4-released/
* mention it as security fix
--
https://bugs.ruby-lang.org/
______________________________________________
ruby-core mailing list -- ruby-core@ml.ruby-lang.org
To unsubscribe send an email to ruby-core-leave@ml.ruby-lang.org
ruby-core info -- https://ml.ruby-lang.org/mailman3/lists/ruby-core.ml.ruby-lang.org/
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2024-09-03 6:00 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-08-19 9:21 [ruby-core:118892] [Ruby master Misc#20685] Ruby 3.2.4 tag mentions unrelated changes (CVE-2024-27280) kenhys (Kentaro Hayashi) via ruby-core
2024-08-19 10:13 ` [ruby-core:118893] " nagachika (Tomoyuki Chikanaga) via ruby-core
2024-09-03 6:00 ` [ruby-core:119020] " hsbt (Hiroshi SHIBATA) via ruby-core
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).