ruby3.0 (3.0.2-7ubuntu2.11) jammy-security; urgency=medium * SECURITY UPDATE: denial of service in resolv - debian/patches/CVE-2025-24294.patch: Limit decompressed name length - CVE-2025-24294 -- Nishit Majithia <nishit.majithia@canonical.com> Tue, 02 Sep 2025 16:05:35 +0530 ruby3.0 (3.0.2-7ubuntu2.10) jammy-security; urgency=medium * SECURITY UPDATE: DoS in REXML via many < in an attribute value - debian/patches/CVE-2024-35176-pre2.patch: use string scanner with baseparser. - debian/patches/CVE-2024-35176-pre3.patch: use @scanner << readline instead of @scanner.string = @scanner.rest + readline. - debian/patches/CVE-2024-35176-pre4.patch: use more StringScanner based API to parse XML. - debian/patches/CVE-2024-35176-pre5.patch: optimize the parse_attributes method to use Source#match to parse XML. - debian/patches/CVE-2024-35176-1.patch: read quoted attributes in chunks. - debian/patches/CVE-2024-35176-2.patch: add support for old strscan. - CVE-2024-35176 * SECURITY UPDATE: DoS in REXML via many specific characters - debian/patches/CVE-2024-39908-pre1.patch: remove Source#string= method. - debian/patches/CVE-2024-39908-pre2.patch: add a "malformed comment" check for top-level comments. - debian/patches/CVE-2024-39908-1.patch: fix performance issue caused by using repeated > characters. - debian/patches/CVE-2024-39908-2.patch: fix ReDoS caused by very large character references using repeated 0s. - debian/patches/CVE-2024-39908-3.patch: fix performance issue caused by using repeated > characters inside comments. - debian/patches/CVE-2024-39908-4.patch: fix performance issue caused by using repeated > characters inside CDATA [ PAYLOAD ]. - debian/patches/CVE-2024-39908-5.patch: fix performance issue caused by using repeated > characters after <!DOCTYPE name. - debian/patches/CVE-2024-39908-6.patch: fix performance issue caused by using repeated > characters inside <!DOCTYPE root [<!-- PAYLOAD -->]>. - debian/patches/CVE-2024-39908-7.patch: fix performance issue caused by using repeated > characters inside <!DOCTYPE name [<!ENTITY>]>. - debian/patches/CVE-2024-39908-8.patch: fix ReDoS by using repeated space characters inside <!DOCTYPE name [<!ATTLIST>]>. - debian/patches/CVE-2024-39908-9.patch: fix performance issue caused by using repeated > characters inside <xml><!-- --></xml>. - CVE-2024-39908 * SECURITY UPDATE: DoS in REXML via many specific characters - debian/patches/CVE-2024-41123-pre1.patch: fix method scope in test in order to invoke the tests properly and fix exception message. - debian/patches/CVE-2024-41123-pre2.patch: add missing encode for custom term. - debian/patches/CVE-2024-41123-pre3.patch: add position check for XML declaration. - debian/patches/CVE-2024-41123-1.patch: fix source.match performance without specifying term string. - debian/patches/CVE-2024-41123-2.patch: parse pi: improve invalid case detection. - CVE-2024-41123 * SECURITY UPDATE: DoS in REXML via many deep elements - debian/patches/CVE-2024-43398-pre1.patch: keep the current namespaces instead of stack of Set. - debian/patches/CVE-2024-43398-1.patch: improve namespace conflicted attribute check performance. - debian/patches/CVE-2024-43398-2.patch: fix handling with "xml:" prefixed namespace. - CVE-2024-43398 * SECURITY UPDATE: DoS in CGI Gem - debian/patches/CVE-2025-27219.patch: use String#concat instead of String#+ for reducing cpu usage in lib/cgi/cookie.rb. - CVE-2025-27219 * SECURITY UPDATE: ReDoS in CGI Gem - debian/patches/CVE-2025-27220.patch: escape/unescape unclosed tags as well in lib/cgi/util.rb, test/cgi/test_cgi_util.rb. - CVE-2025-27220 * SECURITY UPDATE: credential leak in URI gem - debian/patches/CVE-2025-27221-1.patch: truncate userinfo in lib/uri/generic.rb, test/uri/test_generic.rb. - debian/patches/CVE-2025-27221-2.patch: fix merger of URI with authority component in lib/uri/generic.rb, test/uri/test_generic.rb. - CVE-2025-27221 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Mon, 10 Mar 2025 14:14:00 -0400 ruby3.0 (3.0.2-7ubuntu2.8) jammy-security; urgency=medium * SECURITY UPDATE: denial or service in REXML - debian/patches/CVE-2024-35176_39908_41123.patch: Read quoted attributes in chunks - debian/patches/CVE-2024-41946.patch: Add support for XML entity expansion limitation in SAX and pull parsers - debian/patches/CVE-2024-49761.patch: fix a bug that �x...; is accepted as a character reference - CVE-2024-35176 - CVE-2024-39908 - CVE-2024-41123 - CVE-2024-41946 - CVE-2024-49761 -- Nishit Majithia <nishit.majithia@canonical.com> Fri, 25 Oct 2024 11:13:21 +0530 ruby3.0 (3.0.2-7ubuntu2.7) jammy-security; urgency=medium * SECURITY UPDATE: buffer over-read in StringIO - debian/patches/CVE-2024-27280.patch: fix expanding size at ungetc/ungetbyte in ext/stringio/stringio.c, test/stringio/test_stringio.rb. - CVE-2024-27280 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Wed, 19 Jun 2024 10:32:00 -0400 ruby3.0 (3.0.2-7ubuntu2.6) jammy-security; urgency=medium * SECURITY UPDATE: code execution in RDoc - debian/patches/CVE-2024-27281-1.patch: filter marshalled objects in lib/rdoc/store.rb. - debian/patches/CVE-2024-27281-2.patch: use safe_load and safe_load_file for .rdoc_options in lib/rdoc/rdoc.rb, test/rdoc/test_rdoc_options.rb. - debian/patches/CVE-2024-27281-3.patch: fix NoMethodError for start_with in lib/rdoc/store.rb. - CVE-2024-27281 * SECURITY UPDATE: heap data extraction via regex - debian/patches/CVE-2024-27282.patch: fix Use-After-Free issue for Regexp in regexec.c. - CVE-2024-27282 -- Marc Deslauriers <marc.deslauriers@ubuntu.com> Fri, 14 Jun 2024 08:02:18 -0400 ruby3.0 (3.0.2-7ubuntu2.5) jammy; urgency=medium * d/p/fix-ruby_xfree-segfault.patch: fix occasional segfault (LP: #2049197). * Replace expired certificate in tests with upstream patch (LP: #2051380). - d/p/renew-test-certificates-d3933fc753187a055a4904af82f5f3794c88c416.patch -- Lucas Kanashiro <kanashiro@ubuntu.com> Wed, 20 Mar 2024 17:50:02 -0300 ruby3.0 (3.0.2-7ubuntu2.4) jammy-security; urgency=medium * SECURITY UPDATE: ReDoS - debian/patches/CVE-2023-28755.patch: adds '+' once or more in specific places of the RFC3986 regex in order to avoid the increase in execution time for parsing strings to URI objects in lib/uri/rfc3986_parser.rb. - debian/patches/CVE-2023-28755-fix-test-uri-empty-host-again.patch: fix test uri in lib/net/http/generic_request.rb. - CVE-2023-28755 * SECURITY UPDATE: ReDoS - debian/patches/CVE-2023-36617.patch: changes regex behaviour in lib/url/rfc2396_parser.rb, lib/uri/rfc3986_parser.rb. - CVE-2023-36617 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Fri, 07 Jul 2023 11:37:56 -0300 ruby3.0 (3.0.2-7ubuntu2.3) jammy-security; urgency=medium * SECURITY UPDATE: HTTP response splitting - debian/patches/CVE-2021-33621*.patch: adds regex to lib/cgi/core.rb and lib/cgi/cookie.rb along with tests to check http response headers and cookie fields for invalid characters. - debian/patches/fix_tzdata-2022.patch: fix for tzdata-2022g tests in test/ruby/test_time_tz.rb. - CVE-2021-33621 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Wed, 18 Jan 2023 14:28:21 -0300 ruby3.0 (3.0.2-7ubuntu2.2) jammy; urgency=medium * d/p/fix-length-calc-for-Array#slice.patch: Add patch to fix length calculation for Array#slice!. (LP: #1982703) -- Utkarsh Gupta <utkarsh@ubuntu.com> Mon, 14 Nov 2022 17:21:06 +0530 ruby3.0 (3.0.2-7ubuntu2.1) jammy-security; urgency=medium * SECURITY UPDATE: Double free - debian/patches/CVE-2022-28738.patch: just free compiled pattern if no space is used in regcomp.c, test/ruby/test_regexp.rb. - CVE-2022-28738 * SECURITY UPDATE: Buffer over-read - debian/patches/CVE-2022-28739.patch: fix dtoa buffer overrun in missing/dtoa.c, test/ruby/test_float.rb. - CVE-2022-28739 -- Leonidas Da Silva Barbosa <leo.barbosa@canonical.com> Tue, 24 May 2022 16:36:26 -0300 # For older changelog entries, run 'apt-get changelog ruby3.0-doc'
Generated by dwww version 1.14 on Sat Sep 6 03:12:15 CEST 2025.