summaryrefslogtreecommitdiffstats
path: root/package/ruby/ruby.hash
Commit message (Collapse)AuthorAgeFilesLines
* ruby: security bump to version 2.4.5Peter Korsgaard2018-10-301-3/+3
| | | | | | | | | | | | | | | Fixes the following security issues: - CVE-2018-16396: Tainted flags are not propagated in Array#pack and String#unpack with some directives https://www.ruby-lang.org/en/news/2018/10/17/not-propagated-taint-flag-in-some-formats-of-pack-cve-2018-16396/ - CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly https://www.ruby-lang.org/en/news/2018/10/17/openssl-x509-name-equality-check-does-not-work-correctly-cve-2018-16395/ Update hash of LEGAL as it had a few (wayback machine) URLs added/changed. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* ruby: security bump to version 2.4.4Peter Korsgaard2018-08-171-2/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Fixes the following security issues: CVE-2017-17405: Command injection vulnerability in Net::FTP (2.4.3): https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/ CVE-2017-17742: HTTP response splitting in WEBrick (2.4.4): https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/ CVE-2018-6914: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (2.4.4): https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/ CVE-2018-8777: DoS by large request in WEBrick (2.4.4): https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/ CVE-2018-8778: Buffer under-read in String#unpack (2.4.4): https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/ CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket (2.4.4): https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/ CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir (2.4.4): https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/ Multiple vulnerabilities in RubyGems (2.4.4): https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/ Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* ruby: security bump to version 2.4.2Peter Korsgaard2017-11-121-2/+6
| | | | | | | | | | | | | | | | | | Fixed the following security issues: CVE-2017-0898: Buffer underrun vulnerability in Kernel.sprintf CVE-2017-10784: Escape sequence injection vulnerability in the Basic authentication of WEBrick CVE-2017-14033: Buffer underrun vulnerability in OpenSSL ASN1 decode CVE-2017-14064: Heap exposure in generating JSON For more details, see the release notes: https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-4-2-released/ Drop now upstreamed rubygems patches and add hashes for the license files while we're at it. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* ruby: bump version to 2.4.1Vicente Olivert Riera2017-03-221-2/+2
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* ruby: bump version to 2.4.0Vicente Olivert Riera2017-01-131-2/+2
| | | | | | | | | The problem addressed by 0001 patch has been fixed upstream and is that fix is included in this release: https://github.com/ruby/ruby/commit/aa107497cd379b713eba8cecdb9a882bb1e0dd89 Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* ruby: bump version to 2.3.3Vicente Olivert Riera2016-11-211-2/+2
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* ruby: bump version to 2.3.2Vicente Olivert Riera2016-11-151-2/+2
| | | | | Signed-off-by: Vicente Olivert Riera <Vincent.Riera@imgtec.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* ruby: bump to version 2.3.1Gustavo Zacarias2016-04-271-2/+2
| | | | | Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* ruby: bump to version 2.3.0Gustavo Zacarias2016-01-081-2/+2
| | | | | Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* ruby: security bump to version 2.2.4Gustavo Zacarias2015-12-171-2/+2
| | | | | | | | Fixes: CVE-2015-7551 - Unsafe tainted string usage in Fiddle and DL Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* ruby: bump to version 2.2.3Gustavo Zacarias2015-09-011-2/+2
| | | | | Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* ruby: security bump to version 2.2.2Gustavo Zacarias2015-04-141-2/+2
| | | | | | | | Fixes: CVE-2015-1855 - OpenSSL extension’s hostname verification vulnerability. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* ruby: bump to version 2.2.1Gustavo Zacarias2015-03-031-2/+2
| | | | | Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* ruby: security bump to version 2.1.5Gustavo Zacarias2014-11-131-2/+2
| | | | | | | | Fixes: CVE-2014-8090 - Another Denial Of Service XML Expansion. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
* ruby: security bump to version 2.1.4Gustavo Zacarias2014-10-271-2/+2
| | | | | | | | | | Fixes: CVE-2014-8080 - Denial of service XML expansion And change default ext/openssl settings WRT CVE-2014-3566. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
* ruby: bump to version 2.1.3Gustavo Zacarias2014-10-021-0/+2
Also add hash file. Signed-off-by: Gustavo Zacarias <gustavo@zacarias.com.ar> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com>
OpenPOWER on IntegriCloud