lp:ubuntu/dapper-updates/ruby1.8

Created by James Westby and last modified
Get this branch:
bzr branch lp:ubuntu/dapper-updates/ruby1.8
Members of Ubuntu branches can upload to this branch. Log in for directions.

Branch merges

Related bugs

Related blueprints

Branch information

Owner:
Ubuntu branches
Review team:
Ubuntu Development Team
Status:
Development

Recent revisions

13. By Marc Deslauriers

* SECURITY UPDATE: certificate spoofing via invalid return value check
  in OCSP_basic_verify
  - debian/patches/924_CVE-2009-0642.patch: also check for -1 return
    code in ext/openssl/ossl_ocsp.c.
  - CVE-2009-0642
* SECURITY UPDATE: denial of service in BigDecimal library via string
  argument that represents a large number (LP: #385436)
  - debian/patches/925_CVE-2009-1904.patch: handle large numbers properly
    in ext/bigdecimal/bigdecimal.c.
  - CVE-2009-1904

12. By Jamie Strandboge

* SECURITY UPDATE: denial of service via resource exhaustion in the REXML
  module (LP: #261459)
  - debian/patches/917_CVE-2008-3790.patch: adjust rexml/document.rb and
    rexml/entity.rb to use expansion limits
  - CVE-2008-3790
* SECURITY UPDATE: integer overflow in rb_ary_fill may cause denial of
  service (LP: #246818)
  - debian/patches/918_CVE-2008-2376.patch: adjust array.c to properly
    check argument length
  - CVE-2008-2376
* SECURITY UPDATE: denial of service via multiple long requests to a Ruby
  socket
  - debian/patches/919_CVE-2008-3443.patch: adjust regex.c to not use ruby
    managed memory and check for allocation failures
  - CVE-2008-3443
* SECURITY UPDATE: denial of service via crafted HTTP request (LP: #257122)
  - debian/patches/920_CVE-2008-3656.patch: update webrick/httputils.rb to
    properly check paths ending with '.'
  - CVE-2008-3656
* SECURITY UPDATE: predictable transaction id and source port for DNS
  requests (separate vulnerability from CVE-2008-1447)
  - debian/patches/921_CVE-2008-3905.patch: adjust resolv.rb to use
    SecureRandom for transaction id and source port
  - CVE-2008-3905
* SECURITY UPDATE: safe level bypass via DL.dlopen
  - debian/patches/922_CVE-2008-3657.patch: adjust rb_str_to_ptr and
    rb_ary_to_ptr in ext/dl/dl.c and rb_dlsym_call in ext/dl/sym.c to
    propogate taint and check taintness of DLPtrData
  - CVE-2008-3657
* SECURITY UPDATE: safe level bypass via multiple vectors
  - debian/patches/923_CVE-2008-3655.patch: use rb_secure(4) in variable.c
    and syslog.c, check for secure level 3 or higher in eval.c and make
    sure PROGRAM_NAME can't be modified
  - CVE-2008-3655

11. By Jamie Strandboge

* SECURITY UPDATE: denial of service or arbitrary code execution via
  integer overflows and memory corruption
* debian/patches/916_CVE-2008-2662+2663+2664+2725+2726.patch: update array.c
  to properly validate the size of an array. Update string.c and sprintf.c
  for proper bounds checking. Also modify ruby.h for RARRAY_PTR macro (taken
  from 1.8.5-4ubuntu2)
* References:
  CVE-2008-2662
  CVE-2008-2663
  CVE-2008-2664
  CVE-2008-2725
  CVE-2008-2726
  LP: #241657

10. By Stephan RĂ¼gamer

* SECURITY UPDATE: SSL connections did not check commonName early
  enough, possibly allowing sensitive information to be exposed.
* debian/patches/915_CVE-2007-5162.patch: upstream fixes, from
  http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13499
* debian/patches/915_CVE-2007-5770.patch: upstream fixes, from
  http://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=rev&revision=13656
* References:
  CVE-2007-5162 CVE-2007-5770 (LP: #149616)

9. By Kees Cook

* SECURITY UPDATE: remote denial of service in CGI module.
* Add 'debian/patches/914_CVE-2006-6303' patch from upstream.
* References
  http://www.ruby-lang.org/en/news/2006/12/04/another-dos-vulnerability-in-cgi-library/
  CVE-2006-6303

8. By Kees Cook

* SECURITY UPDATE: remote denial of service in CGI module.
* Add 'debian/patches/913_CVE-2006-5467' patch from upstream.
* References
  http://rubyforge.org/pipermail/mongrel-users/2006-October/001946.html
  CVE-2006-5467

7. By Martin Pitt

* SECURITY UPDATE: Safe level bypass.
* Add debian/patches/100_CVE-2006-3694.patch:
  - eval.c, alias(): preserve current safe level
    http://www.ruby-lang.org/cgi-bin/cvsweb.cgi/ruby/eval.c?cvsroot=src&r1=1.616.2.166&r2=1.616.2.167
    (only relevant part)
  - re.c: do not modify untainted levels in safe levels > 3
    http://www.ruby-lang.org/cgi-bin/cvsweb.cgi/ruby/re.c?cvsroot=src&r1=1.114.2.17&r2=1.114.2.18
    (only last hunk is relevant)
  - dir.c: should not close untainted dir stream
    http://www.ruby-lang.org/cgi-bin/cvsweb.cgi/ruby/dir.c?cvsroot=src&r1=1.92.2.32&r2=1.92.2.33
  - CVE-2006-3694

6. By Fabio Massimo Di Nitto

* Fix libruby sparc runtime illegal instructions:
  - add patch debian/patches/903_sparc_fix_define.patch
(Fix by David S. Miller)

5. By akira yamada <email address hidden>

* akira yamada <email address hidden>
- new upstream version.
- removed debian/patches/100_1.8.4-preview2+.patch:
    - included in upstream.
- added debian/patches/802_yaml_symbol.patch:
    - YAML loading of quoted symbols is broken (Closes: #344042)
- README.Debian improvement suggestion (Closes: #344293)
- debian/compat: compat level 4.

4. By akira yamada <email address hidden>

* akira yamada <email address hidden>
- debian/control: updated description of ruby1.8.
- new upstream snapshot. (1.8.4-preview2)
- removed debian/patches/100_1.8.4-preview1.patch:
    - these are included in 1.8.4-preview2.
- added debian/patches/100_1.8.4-preview2+.patch:
    - bug fixes.
- configure with -O2 for IA64.

Branch metadata

Branch format:
Branch format 7
Repository format:
Bazaar repository format 2a (needs bzr 1.16 or later)
Stacked on:
lp:ubuntu/karmic/ruby1.8
This branch contains Public information 
Everyone can see this information.

Subscribers