Name Status Last Modified Last Commit
lp:ubuntu/wily/ruby1.9 1 Development 2015-05-06 07:53:43 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/vivid/ruby1.9 2 Mature 2014-10-27 11:26:49 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/utopic/ruby1.9 2 Mature 2014-04-25 14:08:18 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/trusty/ruby1.9 2 Mature 2013-10-20 03:55:06 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/saucy/ruby1.9 2 Mature 2013-04-26 20:10:56 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/raring/ruby1.9 2 Mature 2012-10-20 12:32:49 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/quantal/ruby1.9 2 Mature 2012-04-26 16:45:43 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/precise/ruby1.9 2 Mature 2011-10-13 16:37:24 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/oneiric/ruby1.9 2 Mature 2011-04-28 15:38:23 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/natty/ruby1.9 2 Mature 2010-10-13 06:45:25 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/maverick/ruby1.9 2 Mature 2010-05-01 01:01:47 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/lucid/ruby1.9 bug 1 Development 2010-02-22 22:21:02 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-22 16:34:02 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/karmic-security/ruby1.9 bug 2 Mature 2010-02-17 21:42:51 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-12 09:16:22 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/intrepid-updates/ruby1.9 bug 1 Development 2010-02-17 21:42:21 UTC
23. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-11 16:40:38 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/922_security_CVE-2009-4124.dpatch: calculate lengths
    properly in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/923_security_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492

lp:ubuntu/jaunty-security/ruby1.9 bug 2 Mature 2010-02-17 21:42:13 UTC
24. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-11 16:37:11 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/933_security_CVE-2009-4124.dpatch: calculate lengths
    properly in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/934_security_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492

lp:ubuntu/karmic-updates/ruby1.9 2 Mature 2010-02-17 21:41:07 UTC
26. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-12 09:16:22 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/932_CVE-2009-4124.dpatch: calculate lengths properly
    in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/933_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/934_CVE-2009-1904.dpatch: handle large numbers
    properly in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

lp:ubuntu/intrepid-security/ruby1.9 bug 1 Development 2010-02-11 16:40:38 UTC
23. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-11 16:40:38 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/922_security_CVE-2009-4124.dpatch: calculate lengths
    properly in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/923_security_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492

lp:ubuntu/jaunty-updates/ruby1.9 2 Mature 2010-02-11 16:37:11 UTC
24. * SECURITY UPDATE: arbitrary code exe...

Author: Marc Deslauriers
Revision Date: 2010-02-11 16:37:11 UTC

* SECURITY UPDATE: arbitrary code execution via string operations
  - debian/patches/933_security_CVE-2009-4124.dpatch: calculate lengths
    properly in string.c, add test in test/ruby/test_string.rb.
  - CVE-2009-4124
* SECURITY UPDATE: incorrect log file sanitation in WEBrick (LP: #509392)
  - debian/patches/934_security_CVE-2009-4492.dpatch: properly escape in
    lib/webrick/{accesslog.rb,httprequest.rb,httpstatus.rb,httputils.rb},
    add test to test/webrick/test_cgi.rb.
  - CVE-2009-4492

lp:ubuntu/karmic/ruby1.9 bug 1 Development 2009-10-05 13:49:40 UTC
25. Backported fix for build failure with...

Author: Lucas Nussbaum
Revision Date: 2009-10-05 13:49:40 UTC

Backported fix for build failure with -D_FORTIFY_SOURCE from upstream.
See http://redmine.ruby-lang.org/issues/show/1299
Fixes build failure on i386.

lp:ubuntu/jaunty/ruby1.9 1 Development 2009-06-27 07:55:23 UTC
22. * Merge with Debian; remaining change...

Author: Matthias Klose
Revision Date: 2008-12-03 19:34:10 UTC

* Merge with Debian; remaining changes:
  - Fix build failure on lpia. LP: #255890.

lp:ubuntu/intrepid/ruby1.9 1 Development 2009-06-27 07:55:04 UTC
20. Fix build failure on lpia. LP: #255890.

Author: Matthias Klose
Revision Date: 2008-10-25 16:30:38 UTC

Fix build failure on lpia. LP: #255890.

lp:ubuntu/hardy/ruby1.9 1 Development 2009-06-27 07:55:00 UTC
15. * Merge from debian unstable, remaini...

Author: Stephan RĂ¼gamer
Revision Date: 2008-01-24 11:42:29 UTC

* Merge from debian unstable, remaining changes:
  - Robustify check for target_os, fixing build failure on lpia.

lp:ubuntu/gutsy/ruby1.9 1 Development 2009-06-27 07:54:57 UTC
14. * Sync from Debian; remaining changes...

Author: Matthias Klose
Revision Date: 2007-09-04 16:01:17 UTC

* Sync from Debian; remaining changes:
  - Add -g to CFLAGS.
* Fixes build failure on ia64.
* Fixes build failure with gcc-4.2 on lpia.
* Robustify check for target_os, fixing build failure on lpia.
* Set Ubuntu maintainer address.

lp:ubuntu/feisty/ruby1.9 1 Development 2009-06-27 07:54:54 UTC
8. * new upstream snapshot. (2006-06-09)...

Author: akira yamada
Revision Date: 2006-07-13 22:43:47 UTC

* new upstream snapshot. (2006-06-09)
* configure with -fno-strict-aliasing (Bug#370553)
* rdoc1.9 suggests graphviz (Bug#339524)
* debian/copyright: added a note for using libopenssl-ruby1.9. (Bug#367024)
* debian/README.Debian: updated. (Closes: #344294)
* added debian/patches/802_mkconfig.dpatch

lp:ubuntu/edgy/ruby1.9 1 Development 2009-06-27 07:54:52 UTC
8. * new upstream snapshot. (2006-06-09)...

Author: akira yamada
Revision Date: 2006-07-13 22:43:47 UTC

* new upstream snapshot. (2006-06-09)
* configure with -fno-strict-aliasing (Bug#370553)
* rdoc1.9 suggests graphviz (Bug#339524)
* debian/copyright: added a note for using libopenssl-ruby1.9. (Bug#367024)
* debian/README.Debian: updated. (Closes: #344294)
* added debian/patches/802_mkconfig.dpatch

lp:ubuntu/dapper/ruby1.9 1 Development 2009-06-27 07:54:48 UTC
6. * Resynchronized with Debian. * Only ...

Author: Lucas Nussbaum
Revision Date: 2006-05-08 22:23:12 UTC

* Resynchronized with Debian.
* Only change from Debian is the addition of
  debian/patches/903_sparc_fix_define.patch to fix illegal instructions
  at runtime on sparc. (change from 1.9.0+20050921-1ubuntu1)

lp:ubuntu/breezy/ruby1.9 1 Development 2009-06-27 07:54:45 UTC
2. * akira yamada <akira@debian.org> - d...

Author: akira yamada
Revision Date: 2005-06-29 23:53:01 UTC

* akira yamada <akira@debian.org>
- debian/rules: supported to build with dpkg-dev_1.13.
  (ref: <URL:http://lists.debian.org/debian-devel-announce/2005/06/msg00010.html>)
    - changed arch-name for Ruby to i486-linux from i386-linux because
      DEB_BUILD_GNU_TYPE is changed to i486-linux-gnu from i386-linux.
    - (urgency high) used <arch>-linux instead of <arch>-linux-gnu for paths
      in debian/*.files. (ref: Bug#315566)
- added patches/902_extra_search_path.patch:
    - temporally added "/usr/local/lib/site_ruby/1.8/i386-linux" and
      "/usr/lib/ruby/1.8/i386-linux" as extra search paths to Ruby on ix86
      arch.
- added debian/NEWS.

127 of 27 results