stable

ruby-3.2.4-182.fc38

FEDORA-2024-48bdd3abbf created by vondruch 10 months ago for Fedora 38

Upgrade to Ruby 3.2.4.

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2024-48bdd3abbf

This update has been submitted for testing by vondruch.

10 months ago

This update's test gating status has been changed to 'ignored'.

10 months ago

This update has been pushed to testing.

10 months ago

This update has been submitted for stable by bodhi.

9 months ago

This update has been pushed to stable.

9 months ago

Please login to add feedback.

Metadata
Type
security
Severity
medium
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
10 months ago
in testing
10 months ago
in stable
9 months ago
approved
9 months ago
BZ#2218614 CVE-2023-36617 rubygem-uri: ReDoS vulnerability - upstream's incomplete fix for CVE-2023-28755
0
0
BZ#2221559 TRIAGE-CVE-2023-36617 ruby: rubygem-uri: ReDoS vulnerability - incomplete fix for CVE-2023-28755 [fedora-all]
0
0
BZ#2270544 Ruby 3.2.3 is available
0
0
BZ#2270749 CVE-2024-27281 ruby: RCE vulnerability with .rdoc_options in RDoc
0
0
BZ#2270750 CVE-2024-27280 ruby: Buffer overread vulnerability in StringIO
0
0
BZ#2276810 CVE-2024-27282 ruby: Arbitrary memory address read vulnerability with Regex search
0
0
BZ#2276811 CVE-2024-27282 ruby: Arbitrary memory address read vulnerability with Regex search [fedora-38]
0
0
BZ#2277049 CVE-2024-27281 ruby: RCE vulnerability with .rdoc_options in RDoc [fedora-38]
0
0
BZ#2277058 TRIAGE CVE-2024-27280 ruby: Buffer overread vulnerability in StringIO [fedora-38]
0
0

Automated Test Results