import CS ruby-3.3.5-3.module_el9_4+1112+c9edd103
This commit is contained in:
parent
db7e1d1512
commit
c966e72caf
@ -1738,33 +1738,33 @@ make -C %{_vpath_builddir} runruby TESTRUN_SCRIPT=" \
|
|||||||
%changelog
|
%changelog
|
||||||
* Wed Sep 04 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.5-3
|
* Wed Sep 04 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.5-3
|
||||||
- Upgrade to Ruby 3.3.5
|
- Upgrade to Ruby 3.3.5
|
||||||
Resolves: RHEL-57576
|
Resolves: RHEL-55411
|
||||||
- Fix DoS vulnerability in rexml.
|
- Fix DoS vulnerability in rexml.
|
||||||
(CVE-2024-39908)
|
(CVE-2024-39908)
|
||||||
(CVE-2024-41946)
|
(CVE-2024-41946)
|
||||||
(CVE-2024-43398)
|
(CVE-2024-43398)
|
||||||
Resolves: RHEL-57573
|
Resolves: RHEL-57575
|
||||||
Resolves: RHEL-57570
|
Resolves: RHEL-57572
|
||||||
Resolves: RHEL-57578
|
Resolves: RHEL-57068
|
||||||
- Fix REXML DoS when parsing an XML having many specific characters such as
|
- Fix REXML DoS when parsing an XML having many specific characters such as
|
||||||
whitespace character, >] and ]>.
|
whitespace character, >] and ]>.
|
||||||
(CVE-2024-41123)
|
(CVE-2024-41123)
|
||||||
Resolves: RHEL-57567
|
Resolves: RHEL-57569
|
||||||
- Fix incorrect symlink for rubygem-irb's library.
|
- Fix incorrect symlink for rubygem-irb's library.
|
||||||
Resolves: RHEL-57597
|
Resolves: RHEL-42646
|
||||||
|
|
||||||
* Mon May 20 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.1-2
|
* Mon May 20 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.1-2
|
||||||
- Upgrade to Ruby 3.3.1.
|
- Upgrade to Ruby 3.3.1.
|
||||||
Resolves: RHEL-37697
|
Resolves: RHEL-33976
|
||||||
- Fix buffer overread vulnerability in StringIO.
|
- Fix buffer overread vulnerability in StringIO.
|
||||||
(CVE-2024-27280)
|
(CVE-2024-27280)
|
||||||
Resolves: RHEL-37699
|
Resolves: RHEL-34130
|
||||||
- Fix RCE vulnerability with .rdoc_options in RDoc.
|
- Fix RCE vulnerability with .rdoc_options in RDoc.
|
||||||
(CVE-2024-27281)
|
(CVE-2024-27281)
|
||||||
Resolves: RHEL-37696
|
Resolves: RHEL-34122
|
||||||
- Fix Arbitrary memory address read vulnerability with Regex search.
|
- Fix Arbitrary memory address read vulnerability with Regex search.
|
||||||
(CVE-2024-27282)
|
(CVE-2024-27282)
|
||||||
Resolves: RHEL-37698
|
Resolves: RHEL-33872
|
||||||
|
|
||||||
* Wed Jan 17 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.0-1
|
* Wed Jan 17 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.0-1
|
||||||
- Upgrade to Ruby 3.3.0.
|
- Upgrade to Ruby 3.3.0.
|
||||||
|
Loading…
Reference in New Issue
Block a user