View Git repositories
Name Status Last Modified Last Commit
lp:ubuntu/wily/ruby1.8 1 Development 2015-05-05 16:31:43 UTC
43. * SECURITY UPDATE: Denial of service ...

Author: Tyler Hicks
Revision Date: 2012-02-29 12:11:48 UTC

* SECURITY UPDATE: Denial of service via crafted hash table keys
  (LP: #943451)
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/vivid/ruby1.8 2 Mature 2014-10-25 09:24:27 UTC
43. * SECURITY UPDATE: Denial of service ...

Author: Tyler Hicks
Revision Date: 2012-02-29 12:11:48 UTC

* SECURITY UPDATE: Denial of service via crafted hash table keys
  (LP: #943451)
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/utopic/ruby1.8 2 Mature 2014-04-25 22:47:02 UTC
43. * SECURITY UPDATE: Denial of service ...

Author: Tyler Hicks
Revision Date: 2012-02-29 12:11:48 UTC

* SECURITY UPDATE: Denial of service via crafted hash table keys
  (LP: #943451)
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/trusty/ruby1.8 2 Mature 2013-10-20 06:42:47 UTC
43. * SECURITY UPDATE: Denial of service ...

Author: Tyler Hicks
Revision Date: 2012-02-29 12:11:48 UTC

* SECURITY UPDATE: Denial of service via crafted hash table keys
  (LP: #943451)
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/saucy/ruby1.8 2 Mature 2013-04-26 01:54:55 UTC
43. * SECURITY UPDATE: Denial of service ...

Author: Tyler Hicks
Revision Date: 2012-02-29 12:11:48 UTC

* SECURITY UPDATE: Denial of service via crafted hash table keys
  (LP: #943451)
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/raring/ruby1.8 2 Mature 2012-10-20 10:40:48 UTC
43. * SECURITY UPDATE: Denial of service ...

Author: Tyler Hicks
Revision Date: 2012-02-29 12:11:48 UTC

* SECURITY UPDATE: Denial of service via crafted hash table keys
  (LP: #943451)
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/quantal/ruby1.8 2 Mature 2012-04-26 18:24:08 UTC
43. * SECURITY UPDATE: Denial of service ...

Author: Tyler Hicks
Revision Date: 2012-02-29 12:11:48 UTC

* SECURITY UPDATE: Denial of service via crafted hash table keys
  (LP: #943451)
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/oneiric-updates/ruby1.8 2 Mature 2012-04-11 07:09:43 UTC
43. * SECURITY UPDATE: Denial of service ...

Author: Tyler Hicks
Revision Date: 2012-02-21 16:28:51 UTC

* SECURITY UPDATE: Denial of service via crafted hash table keys
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/oneiric-security/ruby1.8 2 Mature 2012-04-11 07:09:37 UTC
43. * SECURITY UPDATE: Denial of service ...

Author: Tyler Hicks
Revision Date: 2012-02-21 16:28:51 UTC

* SECURITY UPDATE: Denial of service via crafted hash table keys
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/natty-updates/ruby1.8 2 Mature 2012-04-11 07:09:32 UTC
40. * SECURITY UPDATE: Arbitrary code exe...

Author: Tyler Hicks
Revision Date: 2012-02-21 16:28:51 UTC

* SECURITY UPDATE: Arbitrary code execution and denial of service
  - debian/patches/CVE-2011-0188.patch: Remove cast to prevent memory
    corruption during allocation. Based on upstream patch.
  - CVE-2011-0188
* SECURITY UPDATE: Arbitrary file deletion due to symlink race
  - debian/patches/CVE-2011-1004.patch: Unlink the symlink rather
    than recursively removing everything underneath the symlink
    destination. Based on upstream patch.
  - CVE-2011-1004
* SECURITY UPDATE: Safe level bypass
  - debian/patches/CVE-2011-1005.patch: Remove incorrect string taint
    in exception handling methods. Based on upstream patch.
  - CVE-2011-1005
* SECURITY UPDATE: Predictable random number generation
  - debian/patches/CVE-2011-2686.patch: Reseed the random number
    generator each time a child process is created. Based on upstream
    patch.
  - CVE-2011-2686
* SECURITY UPDATE: Predicatable random number generation
  - debian/patches/CVE-2011-2705.patch: Reseed the random number
    generator with the pid number and the current time to prevent
    predictable random numbers in the case of pid number rollover. Based on
    upstream patch.
  - CVE-2011-2705
* SECURITY UPDATE: Denial of service via crafted hash table keys
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/intrepid-updates/ruby1.8 bug 1 Development 2012-04-11 07:09:30 UTC
25. * SECURITY UPDATE: certificate spoofi...

Author: Marc Deslauriers
Revision Date: 2009-07-15 11:49:36 UTC

* SECURITY UPDATE: certificate spoofing via invalid return value check
  in OCSP_basic_verify
  - debian/patches/906_security_CVE-2009-0642.dpatch: also check for -1
    return code in ext/openssl/ossl_ocsp.c.
  - CVE-2009-0642
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/907_security_CVE-2009-1904.dpatch: handle large
    numbers properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/gutsy-security/ruby1.8 bug 1 Development 2012-04-11 07:09:28 UTC
23. * SECURITY UPDATE: denial of service ...

Author: Jamie Strandboge
Revision Date: 2008-10-09 08:47:35 UTC

* SECURITY UPDATE: denial of service via resource exhaustion in the REXML
  module (LP: #261459)
  - debian/patches/103_CVE-2008-3790.dpatch: adjust rexml/document.rb and
    rexml/entity.rb to use expansion limits
  - CVE-2008-3790
* SECURITY UPDATE: integer overflow in rb_ary_fill may cause denial of
  service (LP: #246818)
  - debian/patches/104_CVE-2008-2376.dpatch: adjust array.c to properly
    check argument length
  - CVE-2008-2376
* SECURITY UPDATE: denial of service via multiple long requests to a Ruby
  socket
  - debian/patches/105_CVE-2008-3443.dpatch: adjust regex.c to not use ruby
    managed memory and check for allocation failures
  - CVE-2008-3443
* SECURITY UPDATE: denial of service via crafted HTTP request (LP: #257122)
  - debian/patches/106_CVE-2008-3656.dpatch: update webrick/httputils.rb to
    properly check paths ending with '.'
  - CVE-2008-3656
* SECURITY UPDATE: predictable transaction id and source port for DNS
  requests (separate vulnerability from CVE-2008-1447)
  - debian/patches/107_CVE-2008-3905.dpatch: adjust resolv.rb to use
    SecureRandom for transaction id and source port
  - CVE-2008-3905
* SECURITY UPDATE: safe level bypass via DL.dlopen
  - debian/patches/108_CVE-2008-3657.dpatch: adjust rb_str_to_ptr and
    rb_ary_to_ptr in ext/dl/dl.c and rb_dlsym_call in ext/dl/sym.c to
    propogate taint and check taintness of DLPtrData
  - CVE-2008-3657
* SECURITY UPDATE: safe level bypass via multiple vectors
  - debian/patches/109_CVE-2008-3655.dpatch: use rb_secure(4) in variable.c
    and syslog.c, check for secure level 3 or higher in eval.c and make
    sure PROGRAM_NAME can't be modified
  - CVE-2008-3655

lp:ubuntu/natty-security/ruby1.8 2 Mature 2012-04-11 07:09:26 UTC
40. * SECURITY UPDATE: Arbitrary code exe...

Author: Tyler Hicks
Revision Date: 2012-02-21 16:28:51 UTC

* SECURITY UPDATE: Arbitrary code execution and denial of service
  - debian/patches/CVE-2011-0188.patch: Remove cast to prevent memory
    corruption during allocation. Based on upstream patch.
  - CVE-2011-0188
* SECURITY UPDATE: Arbitrary file deletion due to symlink race
  - debian/patches/CVE-2011-1004.patch: Unlink the symlink rather
    than recursively removing everything underneath the symlink
    destination. Based on upstream patch.
  - CVE-2011-1004
* SECURITY UPDATE: Safe level bypass
  - debian/patches/CVE-2011-1005.patch: Remove incorrect string taint
    in exception handling methods. Based on upstream patch.
  - CVE-2011-1005
* SECURITY UPDATE: Predictable random number generation
  - debian/patches/CVE-2011-2686.patch: Reseed the random number
    generator each time a child process is created. Based on upstream
    patch.
  - CVE-2011-2686
* SECURITY UPDATE: Predicatable random number generation
  - debian/patches/CVE-2011-2705.patch: Reseed the random number
    generator with the pid number and the current time to prevent
    predictable random numbers in the case of pid number rollover. Based on
    upstream patch.
  - CVE-2011-2705
* SECURITY UPDATE: Denial of service via crafted hash table keys
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/hardy-security/ruby1.8 bug 1 Development 2012-04-11 07:09:20 UTC
24. * SECURITY UPDATE: certificate spoofi...

Author: Marc Deslauriers
Revision Date: 2009-07-15 13:06:03 UTC

* SECURITY UPDATE: certificate spoofing via invalid return value check
  in OCSP_basic_verify
  - debian/patches/904_security_CVE-2009-0642.dpatch: also check for -1
    return code in ext/openssl/ossl_ocsp.c.
  - CVE-2009-0642
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/905_security_CVE-2009-1904.dpatch: handle large
    numbers properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/maverick-updates/ruby1.8 1 Development 2012-04-11 07:09:20 UTC
39. * SECURITY UPDATE: Cross-site scripti...

Author: Tyler Hicks
Revision Date: 2012-02-21 16:28:51 UTC

* SECURITY UPDATE: Cross-site scripting via HTTP error responses
  - debian/patches/CVE-2010-0541.patch: Use the ISO-8859-1 character
    set for HTTP error responses. Based on upstream patch.
  - CVE-2010-0541
* SECURITY UPDATE: Arbitrary code execution and denial of service
  - debian/patches/CVE-2011-0188.patch: Remove cast to prevent memory
    corruption during allocation. Based on upstream patch.
  - CVE-2011-0188
* SECURITY UPDATE: Arbitrary file deletion due to symlink race
  - debian/patches/CVE-2011-1004.patch: Unlink the symlink rather
    than recursively removing everything underneath the symlink
    destination. Based on upstream patch.
  - CVE-2011-1004
* SECURITY UPDATE: Safe level bypass
  - debian/patches/CVE-2011-1005.patch: Remove incorrect string taint
    in exception handling methods. Based on upstream patch.
  - CVE-2011-1005
* SECURITY UPDATE: Predictable random number generation
  - debian/patches/CVE-2011-2686.patch: Reseed the random number
    generator each time a child process is created. Based on upstream
    patch.
  - CVE-2011-2686
* SECURITY UPDATE: Predicatable random number generation
  - debian/patches/CVE-2011-2705.patch: Reseed the random number
    generator with the pid number and the current time to prevent
    predictable random numbers in the case of pid number rollover. Based on
    upstream patch.
  - CVE-2011-2705
* SECURITY UPDATE: Denial of service via crafted hash table keys
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/karmic-proposed/ruby1.8 bug 1 Development 2012-04-11 07:09:17 UTC
32. * Added debian/patches/091125_gc_chec...

Author: Bryan McLellan
Revision Date: 2009-12-01 03:33:13 UTC

* Added debian/patches/091125_gc_check.dpatch: Avoid segv on gc run whe
  heap fills up with deferred objects. (LP: #488115)
* Added debian/patches/090812_class_clone_segv.dpatch: avoid segv when an
  object cloned. (LP: #484756)

lp:ubuntu/maverick-security/ruby1.8 1 Development 2012-04-11 07:09:15 UTC
39. * SECURITY UPDATE: Cross-site scripti...

Author: Tyler Hicks
Revision Date: 2012-02-21 16:28:51 UTC

* SECURITY UPDATE: Cross-site scripting via HTTP error responses
  - debian/patches/CVE-2010-0541.patch: Use the ISO-8859-1 character
    set for HTTP error responses. Based on upstream patch.
  - CVE-2010-0541
* SECURITY UPDATE: Arbitrary code execution and denial of service
  - debian/patches/CVE-2011-0188.patch: Remove cast to prevent memory
    corruption during allocation. Based on upstream patch.
  - CVE-2011-0188
* SECURITY UPDATE: Arbitrary file deletion due to symlink race
  - debian/patches/CVE-2011-1004.patch: Unlink the symlink rather
    than recursively removing everything underneath the symlink
    destination. Based on upstream patch.
  - CVE-2011-1004
* SECURITY UPDATE: Safe level bypass
  - debian/patches/CVE-2011-1005.patch: Remove incorrect string taint
    in exception handling methods. Based on upstream patch.
  - CVE-2011-1005
* SECURITY UPDATE: Predictable random number generation
  - debian/patches/CVE-2011-2686.patch: Reseed the random number
    generator each time a child process is created. Based on upstream
    patch.
  - CVE-2011-2686
* SECURITY UPDATE: Predicatable random number generation
  - debian/patches/CVE-2011-2705.patch: Reseed the random number
    generator with the pid number and the current time to prevent
    predictable random numbers in the case of pid number rollover. Based on
    upstream patch.
  - CVE-2011-2705
* SECURITY UPDATE: Denial of service via crafted hash table keys
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/lucid-updates/ruby1.8 2 Mature 2012-04-11 07:09:07 UTC
35. * SECURITY UPDATE: Cross-site scripti...

Author: Tyler Hicks
Revision Date: 2012-02-21 16:28:51 UTC

* SECURITY UPDATE: Cross-site scripting via HTTP error responses
  - debian/patches/CVE-2010-0541.patch: Use the ISO-8859-1 character
    set for HTTP error responses. Based on upstream patch.
  - CVE-2010-0541
* SECURITY UPDATE: Arbitrary code execution and denial of service
  - debian/patches/CVE-2011-0188.patch: Remove cast to prevent memory
    corruption during allocation. Based on upstream patch.
  - CVE-2011-0188
* SECURITY UPDATE: Arbitrary file deletion due to symlink race
  - debian/patches/CVE-2011-1004.patch: Unlink the symlink rather
    than recursively removing everything underneath the symlink
    destination. Based on upstream patch.
  - CVE-2011-1004
* SECURITY UPDATE: Safe level bypass
  - debian/patches/CVE-2011-1005.patch: Remove incorrect string taint
    in exception handling methods. Based on upstream patch.
  - CVE-2011-1005
* SECURITY UPDATE: Predictable random number generation
  - debian/patches/CVE-2011-2686.patch: Reseed the random number
    generator each time a child process is created. Based on upstream
    patch.
  - CVE-2011-2686
* SECURITY UPDATE: Predicatable random number generation
  - debian/patches/CVE-2011-2705.patch: Reseed the random number
    generator with the pid number and the current time to prevent
    predictable random numbers in the case of pid number rollover. Based on
    upstream patch.
  - CVE-2011-2705
* SECURITY UPDATE: Denial of service via crafted hash table keys
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/lucid-security/ruby1.8 2 Mature 2012-04-11 07:09:03 UTC
35. * SECURITY UPDATE: Cross-site scripti...

Author: Tyler Hicks
Revision Date: 2012-02-21 16:28:51 UTC

* SECURITY UPDATE: Cross-site scripting via HTTP error responses
  - debian/patches/CVE-2010-0541.patch: Use the ISO-8859-1 character
    set for HTTP error responses. Based on upstream patch.
  - CVE-2010-0541
* SECURITY UPDATE: Arbitrary code execution and denial of service
  - debian/patches/CVE-2011-0188.patch: Remove cast to prevent memory
    corruption during allocation. Based on upstream patch.
  - CVE-2011-0188
* SECURITY UPDATE: Arbitrary file deletion due to symlink race
  - debian/patches/CVE-2011-1004.patch: Unlink the symlink rather
    than recursively removing everything underneath the symlink
    destination. Based on upstream patch.
  - CVE-2011-1004
* SECURITY UPDATE: Safe level bypass
  - debian/patches/CVE-2011-1005.patch: Remove incorrect string taint
    in exception handling methods. Based on upstream patch.
  - CVE-2011-1005
* SECURITY UPDATE: Predictable random number generation
  - debian/patches/CVE-2011-2686.patch: Reseed the random number
    generator each time a child process is created. Based on upstream
    patch.
  - CVE-2011-2686
* SECURITY UPDATE: Predicatable random number generation
  - debian/patches/CVE-2011-2705.patch: Reseed the random number
    generator with the pid number and the current time to prevent
    predictable random numbers in the case of pid number rollover. Based on
    upstream patch.
  - CVE-2011-2705
* SECURITY UPDATE: Denial of service via crafted hash table keys
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/karmic-updates/ruby1.8 1 Development 2012-04-11 07:08:52 UTC
32. * Added debian/patches/091125_gc_chec...

Author: Bryan McLellan
Revision Date: 2009-12-01 03:33:13 UTC

* Added debian/patches/091125_gc_check.dpatch: Avoid segv on gc run whe
  heap fills up with deferred objects. (LP: #488115)
* Added debian/patches/090812_class_clone_segv.dpatch: avoid segv when an
  object cloned. (LP: #484756)

lp:ubuntu/jaunty/ruby1.8 1 Development 2012-04-11 07:08:37 UTC
24. * applied debian/patches/905_class_du...

Author: akira yamada
Revision Date: 2009-01-06 10:56:56 UTC

* applied debian/patches/905_class_dup_should_copy_constants.dpatch:
  - Class#dup should copy constants into the duplicated class.
    (closes: #506344)

lp:ubuntu/precise/ruby1.8 bug 2 Mature 2012-04-11 07:08:29 UTC
43. * SECURITY UPDATE: Denial of service ...

Author: Tyler Hicks
Revision Date: 2012-02-29 12:11:48 UTC

* SECURITY UPDATE: Denial of service via crafted hash table keys
  (LP: #943451)
  - debian/patches/CVE-2011-4815.patch: Add randomness to the key hashing
    algorithm to prevent predictable results when inserting objects into a
    hash table. Based on upstream patch.
  - CVE-2011-4815

lp:ubuntu/intrepid/ruby1.8 1 Development 2012-04-11 07:08:27 UTC
22. * New upstream release. - many patc...

Author: Lucas Nussbaum
Revision Date: 2008-09-10 10:27:45 UTC

* New upstream release.
  - many patches in 1.8.7.22-4 were simply backported from upstream SVN, and
    are integrated into that release. We drop those:
    + 103_array_c_r17472_to_r17756.dpatch
    + 810_ruby187p22_fixes.dpatch
    + 811_multiple_vuln_200808.dpatch
  - Fixes the following security issues: (Closes: #494401)
    * Several vulnerabilities in safe level
    * DoS vulnerability in WEBrick
    * Lack of taintness check in dl
    * DNS spoofing vulnerability in resolv.rb (CVE-2008-1447)
* Applied debian/patches/168_rexml_dos.dpatch:
  Fix CVE-2008-3790 (REXML expansion DOS). Closes: #496808.

lp:ubuntu/hardy/ruby1.8 2 Mature 2012-04-11 07:08:17 UTC
18. * Merge from debian unstable, remaini...

Author: Michael Vogt
Revision Date: 2007-11-23 16:08:57 UTC

* Merge from debian unstable, remaining changes:
  - Adjust configure options for lpia.
  - add -g when build with noopt

lp:ubuntu/gutsy/ruby1.8 1 Development 2012-04-11 07:08:04 UTC
17. Trigger rebuild for hppa

Author: LaMont Jones
Revision Date: 2007-10-04 12:23:01 UTC

Trigger rebuild for hppa

lp:ubuntu/feisty/ruby1.8 1 Development 2012-04-11 07:07:57 UTC
11. * Rebuild for changes in the amd64 to...

Author: Matthias Klose
Revision Date: 2007-03-05 01:26:02 UTC

* Rebuild for changes in the amd64 toolchain.
* Set Ubuntu maintainer address.

lp:ubuntu/edgy/ruby1.8 1 Development 2012-04-11 07:07:50 UTC
7. Merge from debian unstable.

Author: Fabio Massimo Di Nitto
Revision Date: 2006-07-04 09:42:14 UTC

Merge from debian unstable.

lp:ubuntu/dapper/ruby1.8 1 Development 2012-04-11 07:07:42 UTC
6. * Fix libruby sparc runtime illegal i...

Author: Fabio Massimo Di Nitto
Revision Date: 2006-03-17 10:32:22 UTC

* Fix libruby sparc runtime illegal instructions:
  - add patch debian/patches/903_sparc_fix_define.patch
(Fix by David S. Miller)

lp:ubuntu/breezy/ruby1.8 1 Development 2012-04-11 07:07:35 UTC
4. * SECURITY UPDATE: Fix safe_mode bypa...

Author: Martin Pitt
Revision Date: 2005-10-07 16:41:19 UTC

* SECURITY UPDATE: Fix safe_mode bypass.
* Add debian/patches/910_safe_mode_bypass.patch:
  - eval.c, rb_add_method(): Preserve safe level in the environment where a
    method is defined.
  - eval.c, rb_call0(): Restore preserved safe level in the method
    execution.
  - References:
    http://www.ruby-lang.org/en/20051003.html
    ftp://ftp.ruby-lang.org/pub/ruby/1.8/1.8.2-patch1.gz

lp:ubuntu/hoary/ruby1.8 1 Development 2012-04-11 07:07:29 UTC
3. * akira yamada <akira@debian.org> - n...

Author: akira yamada
Revision Date: 2004-12-23 12:51:28 UTC

* akira yamada <akira@debian.org>
- new upstream version, 1.8.2 preview4:
    - removed debian/patches/{10[01]_cvs_updates.patch,802_socket.c.patch,
      803_rexml_shiftjis.patch}. they ware included 1.8.2 preview4.
    - (urgency high) fixed segv bugs:
        - sprintf dumps core. [ruby-dev:25104]
        - DBM#select dumps core. [ruby-dev:25132]
        - Socket#listen dumps core. [ruby-dev:25149]
        - IO#reopen dumps core. [ruby-dev:25150]
        - OpenSSL::Digest::Digest.new dumps core.
          [ruby-dev:25187][ruby-dev:25198]
        - Dir.foreach dumps core. [ruby-dev:25242]
        - Zlib::Deflate.deflate dumps core. [ruby-dev:25226]
        - Struct.new dumps core. [ruby-dev:25249]
        - IO#eof? dumps core. [ruby-dev:25251]
        - OpenSSL::ASN1.traverse dumps core.
          [ruby-dev:25261][ruby-dev:25261]
        - DL::Symbol.new dumps core. [ruby-dev:25271]
    - fixed bugs:
        - removed debug print for jcode.rb. [ruby-dev:25156]
        - serializes un-serializeable remote exceptions as DRbRemoteError.
          [ruby-list:40390]
        - IO.open could not handle 'w+' mode. (closes: #283030)
        - (urgench high) temporal locking already locked string on
          simultaneous write. [ruby-dev:25050] (closes: #286195)
- added debian/patches/100_cvs_updates.patch:
    - IO#reopen restores exact mode. [ruby-core:04003]
- added debian/patches/801_syck_segv.patch:
    - YAML::Syck::Parser#load dumps core. [ruby-core:03973]
- debian/rules: configure with --disable-rpath.

lp:ubuntu/warty/ruby1.8 1 Development 2012-04-11 07:07:22 UTC
2. * akira yamada <akira@debian.org> - a...

Author: akira yamada
Revision Date: 2004-08-24 21:41:42 UTC

* akira yamada <akira@debian.org>
- added debian/patches/101_cvs_updates.patch:
    - "IO.allocate.reopen('/nothing')" on irb causes SEGV.
      [ruby-core:03288]
    - (urgency high) CGI::Session::FilesStore and CGI::Session::PStore
      should not use a session id as a filename. (closes: #267753)
- added debian/patches/818_instance_eval.patch:
    - core dump with binding, eval, instance_eval and class variable.
      [ruby-dev:24120]
- removed debian/patches/814_syck_8bit_clean.patch,
  debian/patches/815_openssl_select.patch,
  debian/patches/816_exception_slowdown.patch and
  debian/patches/817_ruby-mode.el_fixtypo.patch:
    - included into upstream source.

lp:ubuntu/oneiric/ruby1.8 2 Mature 2011-07-24 12:30:48 UTC
42. Add -fno-tree-sra on armel. Workaroun...

Author: Lucas Nussbaum
Revision Date: 2011-07-24 12:30:48 UTC

Add -fno-tree-sra on armel. Workaround that Closes: #634260

lp:ubuntu/natty/ruby1.8 2 Mature 2010-10-13 07:05:12 UTC
39. Add debian/patches/100901_threading_f...

Author: Lucas Nussbaum
Revision Date: 2010-09-01 12:08:48 UTC

Add debian/patches/100901_threading_fixes.patch. Fixes threading
problems on Debian GNU/kFreeBSD exhibited by puppet.
Thanks to Petr Salinger and Aurélien Jarno. Closes: #595034

lp:ubuntu/maverick/ruby1.8 2 Mature 2010-07-30 17:45:14 UTC
38. * Convert from dpatch to quilt using ...

Author: Lucas Nussbaum
Revision Date: 2010-07-30 17:45:14 UTC

* Convert from dpatch to quilt using dpatch2quilt.sh
* Add patch 100730_disable_getsetcontext_on_nptl: disable getsetcontext on
  NPTL. LP: #307462, Closes: #579229
* Added 100730_verbose-tests.patch: run tests in verbose mode.
* Run make test-all, but do not consider failures fatal for now.
* Upgrade to Standards-Version: 3.9.1. No changes needed.
* Deal with Ubuntu changing the GCC target to i686-linux-gnu: search
  for libs in i486-linux too. LP: #611322.

lp:ubuntu/lucid/ruby1.8 1 Development 2010-03-12 07:13:47 UTC
34. Add 100312_timeout-fix.dpatch: Backpo...

Author: Lucas Nussbaum
Revision Date: 2010-03-12 07:13:47 UTC

Add 100312_timeout-fix.dpatch: Backport upstream change to fix
problem with threads and timeouts. Closes: #539987

lp:ubuntu/jaunty-security/ruby1.8 bug 2 Mature 2009-08-05 03:49:17 UTC
25. * SECURITY UPDATE: certificate spoofi...

Author: Marc Deslauriers
Revision Date: 2009-07-15 10:38:14 UTC

* SECURITY UPDATE: certificate spoofing via invalid return value check
  in OCSP_basic_verify
  - debian/patches/906_security_CVE-2009-0642.dpatch: also check for -1
    return code in ext/openssl/ossl_ocsp.c.
  - CVE-2009-0642
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/907_security_CVE-2009-1904.dpatch: handle large
    numbers properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/intrepid-security/ruby1.8 bug 2 Mature 2009-08-05 03:49:06 UTC
23. * SECURITY UPDATE: certificate spoofi...

Author: Marc Deslauriers
Revision Date: 2009-07-15 11:49:36 UTC

* SECURITY UPDATE: certificate spoofing via invalid return value check
  in OCSP_basic_verify
  - debian/patches/906_security_CVE-2009-0642.dpatch: also check for -1
    return code in ext/openssl/ossl_ocsp.c.
  - CVE-2009-0642
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/907_security_CVE-2009-1904.dpatch: handle large
    numbers properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/jaunty-updates/ruby1.8 2 Mature 2009-08-05 03:47:43 UTC
25. * SECURITY UPDATE: certificate spoofi...

Author: Marc Deslauriers
Revision Date: 2009-07-15 10:38:14 UTC

* SECURITY UPDATE: certificate spoofing via invalid return value check
  in OCSP_basic_verify
  - debian/patches/906_security_CVE-2009-0642.dpatch: also check for -1
    return code in ext/openssl/ossl_ocsp.c.
  - CVE-2009-0642
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/907_security_CVE-2009-1904.dpatch: handle large
    numbers properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/dapper-security/ruby1.8 bug 1 Development 2009-07-20 13:58:07 UTC
13. * SECURITY UPDATE: certificate spoofi...

Author: Marc Deslauriers
Revision Date: 2009-07-15 13:31:57 UTC

* SECURITY UPDATE: certificate spoofing via invalid return value check
  in OCSP_basic_verify
  - debian/patches/924_CVE-2009-0642.patch: also check for -1 return
    code in ext/openssl/ossl_ocsp.c.
  - CVE-2009-0642
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/925_CVE-2009-1904.patch: handle large numbers properly
    in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/dapper-updates/ruby1.8 bug 1 Development 2009-07-15 13:31:57 UTC
13. * SECURITY UPDATE: certificate spoofi...

Author: Marc Deslauriers
Revision Date: 2009-07-15 13:31:57 UTC

* SECURITY UPDATE: certificate spoofing via invalid return value check
  in OCSP_basic_verify
  - debian/patches/924_CVE-2009-0642.patch: also check for -1 return
    code in ext/openssl/ossl_ocsp.c.
  - CVE-2009-0642
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/925_CVE-2009-1904.patch: handle large numbers properly
    in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/hardy-updates/ruby1.8 bug 1 Development 2009-07-15 13:06:03 UTC
24. * SECURITY UPDATE: certificate spoofi...

Author: Marc Deslauriers
Revision Date: 2009-07-15 13:06:03 UTC

* SECURITY UPDATE: certificate spoofing via invalid return value check
  in OCSP_basic_verify
  - debian/patches/904_security_CVE-2009-0642.dpatch: also check for -1
    return code in ext/openssl/ossl_ocsp.c.
  - CVE-2009-0642
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/905_security_CVE-2009-1904.dpatch: handle large
    numbers properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/intrepid-proposed/ruby1.8 bug 1 Development 2009-06-27 18:34:21 UTC
23. debian/patches/905_short_named_consta...

Author: Jamie Strandboge
Revision Date: 2008-11-20 13:24:03 UTC

debian/patches/905_short_named_constants.dpatch: Fix for short-named
constants regression (LP: #282302)

lp:ubuntu/gutsy-updates/ruby1.8 bug 1 Development 2009-06-27 18:34:15 UTC
23. * SECURITY UPDATE: denial of service ...

Author: Jamie Strandboge
Revision Date: 2008-10-09 08:47:35 UTC

* SECURITY UPDATE: denial of service via resource exhaustion in the REXML
  module (LP: #261459)
  - debian/patches/103_CVE-2008-3790.dpatch: adjust rexml/document.rb and
    rexml/entity.rb to use expansion limits
  - CVE-2008-3790
* SECURITY UPDATE: integer overflow in rb_ary_fill may cause denial of
  service (LP: #246818)
  - debian/patches/104_CVE-2008-2376.dpatch: adjust array.c to properly
    check argument length
  - CVE-2008-2376
* SECURITY UPDATE: denial of service via multiple long requests to a Ruby
  socket
  - debian/patches/105_CVE-2008-3443.dpatch: adjust regex.c to not use ruby
    managed memory and check for allocation failures
  - CVE-2008-3443
* SECURITY UPDATE: denial of service via crafted HTTP request (LP: #257122)
  - debian/patches/106_CVE-2008-3656.dpatch: update webrick/httputils.rb to
    properly check paths ending with '.'
  - CVE-2008-3656
* SECURITY UPDATE: predictable transaction id and source port for DNS
  requests (separate vulnerability from CVE-2008-1447)
  - debian/patches/107_CVE-2008-3905.dpatch: adjust resolv.rb to use
    SecureRandom for transaction id and source port
  - CVE-2008-3905
* SECURITY UPDATE: safe level bypass via DL.dlopen
  - debian/patches/108_CVE-2008-3657.dpatch: adjust rb_str_to_ptr and
    rb_ary_to_ptr in ext/dl/dl.c and rb_dlsym_call in ext/dl/sym.c to
    propogate taint and check taintness of DLPtrData
  - CVE-2008-3657
* SECURITY UPDATE: safe level bypass via multiple vectors
  - debian/patches/109_CVE-2008-3655.dpatch: use rb_secure(4) in variable.c
    and syslog.c, check for secure level 3 or higher in eval.c and make
    sure PROGRAM_NAME can't be modified
  - CVE-2008-3655

lp:ubuntu/feisty-security/ruby1.8 bug 1 Development 2009-06-27 18:33:24 UTC
14. * SECURITY UPDATE: denial of service ...

Author: Jamie Strandboge
Revision Date: 2008-10-09 09:28:03 UTC

* SECURITY UPDATE: denial of service via resource exhaustion in the REXML
  module (LP: #261459)
  - debian/patches/953_CVE-2008-3790.patch: adjust rexml/document.rb and
    rexml/entity.rb to use expansion limits
  - CVE-2008-3790
* SECURITY UPDATE: integer overflow in rb_ary_fill may cause denial of
  service (LP: #246818)
  - debian/patches/954_CVE-2008-2376.patch: adjust array.c to properly
    check argument length
  - CVE-2008-2376
* SECURITY UPDATE: denial of service via multiple long requests to a Ruby
  socket
  - debian/patches/955_CVE-2008-3443.patch: adjust regex.c to not use ruby
    managed memory and check for allocation failures
  - CVE-2008-3443
* SECURITY UPDATE: denial of service via crafted HTTP request (LP: #257122)
  - debian/patches/956_CVE-2008-3656.patch: update webrick/httputils.rb to
    properly check paths ending with '.'
  - CVE-2008-3656
* SECURITY UPDATE: predictable transaction id and source port for DNS
  requests (separate vulnerability from CVE-2008-1447)
  - debian/patches/957_CVE-2008-3905.patch: adjust resolv.rb to use
    SecureRandom for transaction id and source port
  - CVE-2008-3905
* SECURITY UPDATE: safe level bypass via DL.dlopen
  - debian/patches/958_CVE-2008-3657.patch: adjust rb_str_to_ptr and
    rb_ary_to_ptr in ext/dl/dl.c and rb_dlsym_call in ext/dl/sym.c to
    propogate taint and check taintness of DLPtrData
  - CVE-2008-3657
* SECURITY UPDATE: safe level bypass via multiple vectors
  - debian/patches/959_CVE-2008-3655.patch: use rb_secure(4) in variable.c
    and syslog.c, check for secure level 3 or higher in eval.c and make
    sure PROGRAM_NAME can't be modified
  - CVE-2008-3655

lp:ubuntu/edgy-security/ruby1.8 bug 1 Development 2009-06-27 18:33:07 UTC
10. * SECURITY UPDATE: SSL connections di...

Author: Stephan Rügamer
Revision Date: 2007-11-13 19:42:37 UTC

* SECURITY UPDATE: SSL connections did not check commonName early
  enough, possibly allowing sensitive information to be exposed.
* debian/patches/915_CVE-2007-5162.patch: upstream fixes, from
  http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13499
* debian/patches/915_CVE-2007-5770.patch: upstream fixes, from
  http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13656
* References:
  CVE-2007-5162 CVE-2007-5770 (LP: #149616)

lp:ubuntu/feisty-updates/ruby1.8 1 Development 2009-06-27 18:32:06 UTC
14. * SECURITY UPDATE: denial of service ...

Author: Jamie Strandboge
Revision Date: 2008-10-09 09:28:03 UTC

* SECURITY UPDATE: denial of service via resource exhaustion in the REXML
  module (LP: #261459)
  - debian/patches/953_CVE-2008-3790.patch: adjust rexml/document.rb and
    rexml/entity.rb to use expansion limits
  - CVE-2008-3790
* SECURITY UPDATE: integer overflow in rb_ary_fill may cause denial of
  service (LP: #246818)
  - debian/patches/954_CVE-2008-2376.patch: adjust array.c to properly
    check argument length
  - CVE-2008-2376
* SECURITY UPDATE: denial of service via multiple long requests to a Ruby
  socket
  - debian/patches/955_CVE-2008-3443.patch: adjust regex.c to not use ruby
    managed memory and check for allocation failures
  - CVE-2008-3443
* SECURITY UPDATE: denial of service via crafted HTTP request (LP: #257122)
  - debian/patches/956_CVE-2008-3656.patch: update webrick/httputils.rb to
    properly check paths ending with '.'
  - CVE-2008-3656
* SECURITY UPDATE: predictable transaction id and source port for DNS
  requests (separate vulnerability from CVE-2008-1447)
  - debian/patches/957_CVE-2008-3905.patch: adjust resolv.rb to use
    SecureRandom for transaction id and source port
  - CVE-2008-3905
* SECURITY UPDATE: safe level bypass via DL.dlopen
  - debian/patches/958_CVE-2008-3657.patch: adjust rb_str_to_ptr and
    rb_ary_to_ptr in ext/dl/dl.c and rb_dlsym_call in ext/dl/sym.c to
    propogate taint and check taintness of DLPtrData
  - CVE-2008-3657
* SECURITY UPDATE: safe level bypass via multiple vectors
  - debian/patches/959_CVE-2008-3655.patch: use rb_secure(4) in variable.c
    and syslog.c, check for secure level 3 or higher in eval.c and make
    sure PROGRAM_NAME can't be modified
  - CVE-2008-3655

lp:ubuntu/edgy-updates/ruby1.8 1 Development 2009-06-27 18:31:47 UTC
10. * SECURITY UPDATE: SSL connections di...

Author: Stephan Rügamer
Revision Date: 2007-11-13 19:42:37 UTC

* SECURITY UPDATE: SSL connections did not check commonName early
  enough, possibly allowing sensitive information to be exposed.
* debian/patches/915_CVE-2007-5162.patch: upstream fixes, from
  http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13499
* debian/patches/915_CVE-2007-5770.patch: upstream fixes, from
  http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13656
* References:
  CVE-2007-5162 CVE-2007-5770 (LP: #149616)

lp:ubuntu/breezy-security/ruby1.8 1 Development 2009-06-27 18:31:17 UTC
8. * SECURITY UPDATE: remote denial of s...

Author: Kees Cook
Revision Date: 2006-12-07 14:41:37 UTC

* SECURITY UPDATE: remote denial of service in CGI module.
* Add 'debian/patches/914_CVE-2006-6303' patch from upstream.
* References
  http://www.ruby-lang.org/en/news/2006/12/04/another-dos-vulnerability-in-cgi-library/
  CVE-2006-6303

lp:ubuntu/hoary-backports/ruby1.8 1 Development 2009-06-27 18:31:04 UTC
4. Automated backport upload; no source ...

Author: Ubuntu Archive Auto-Sync
Revision Date: 2005-08-22 17:41:09 UTC

Automated backport upload; no source changes.

lp:ubuntu/hoary-security/ruby1.8 1 Development 2009-06-27 18:31:00 UTC
7. * SECURITY UPDATE: remote denial of s...

Author: Kees Cook
Revision Date: 2006-10-27 16:09:26 UTC

* SECURITY UPDATE: remote denial of service in CGI module.
* Add 'debian/patches/913_CVE-2006-5467' patch from upstream.
* References
  http://rubyforge.org/pipermail/mongrel-users/2006-October/001946.html
  CVE-2006-5467

lp:ubuntu/warty-security/ruby1.8 1 Development 2009-06-27 18:30:50 UTC
4. * SECURITY UPDATE: Remote DoS in appl...

Author: Martin Pitt
Revision Date: 2006-04-24 11:12:53 UTC

* SECURITY UPDATE: Remote DoS in applications that use the HTTP module.
* Add debian/patches/911_webrick_dos.patch:
  - Use nonblocking sockets for HTTP servers.
  - Patch backported from 1.8.4.
* CVE-2006-1931

lp:ubuntu/karmic/ruby1.8 1 Development 2009-06-27 18:25:33 UTC
31. New upstream release.

Author: daigo
Revision Date: 2009-06-16 23:16:51 UTC

New upstream release.

152 of 52 results