On Sat, Nov 04, 2017 at 10:08:36PM +0100, Salvatore Bonaccorso wrote:
> Hi Antonio
> 
> Sorry for the late reply
> 
> On Mon, Oct 23, 2017 at 11:49:28AM -0200, Antonio Terceiro wrote:
> > Hi security team,
> > 
> > I have prepared a security update for ruby2.3.
> > 
> > It includes all the pending recent CVE's, plus a fix for a bug that
> > causes runaway child processes hogging the CPU, noticed at least in
> > puppet.
> 
> For the later one, not directly a security issue, strictly speaking we
> would need an ack from the SRM to see they would ack it to a point
> release and then we can pick it as well for a security update. The
> patch though looks confined enough that I would trust it's okay as
> well for SRM to see it included (Cc'ed explicity Adam).
> 
> > The test suite still passes both during build, and under autopkgtest. I
> > am running these packages on my workstation since yesterday. The patches
> > are targeted enough that I don't expect any regressions.
> > 
> > As I explained before, unfortunately the patch management for ruby2.3 is
> > not optimal, so I attach both the debdiff and the individual patches
> > that I applied to the git repository. The later will make your review
> > work easier.
> > 
> > You can also inspect the git repository:
> > https://anonscm.debian.org/cgit/collab-maint/ruby.git/log/?h=debian/stretch
> 
> Yes thank you. Please go ahead with the upload to security-master
> (unless you in meanwhile have found any regression caused by the
> update on your workstation).

Uploaded.

Attachment: signature.asc
Description: PGP signature

Reply via email to