Source: ruby3.1 Version: 3.1.2-8 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 3.1.2-7
Hi, The following vulnerability was published for ruby3.1. CVE-2024-27280[0]: | Buffer overread vulnerability in StringIO If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2024-27280 https://www.cve.org/CVERecord?id=CVE-2024-27280 [1] https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/ Regards, Salvatore