lp://staging/ubuntu/trusty-proposed/ruby1.9.1
- Get this branch:
- bzr branch lp://staging/ubuntu/trusty-proposed/ruby1.9.1
Branch merges
Branch information
Recent revisions
- 33. By Adam Conrad
-
* Merge from Debian unstable. Remaining changes:
- debian/control: Add ca-certificates to libruby1.9.1 depends so that
rubygems can perform certificate verification
- debian/rules: Don't install SSL certificates from upstream sources
- debian/patches/ 20120927- rubygems_ disable_ upstream_ certs.patch: Use
/etc/ssl/certs/ ca-certificates .crt for the trusted CA certificates.
- debian/patches/ 20131218- stack-size. patch: Increase thread stack
size on 64-bit platforms to prevent testsuite failure on ppc64el.
- Build-depend on Tcl/Tk 8.5, ruby is not yet ready for Tcl/Tk 8.6. - 32. By Matthias Klose
-
Build-depend on tcl8.5-dev and tk8.5-dev, ruby is not yet ready
for Tcl/Tk 8.6. - 31. By Adam Conrad
-
* Merge from Debian unstable. Remaining changes:
- debian/control: Add ca-certificates to libruby1.9.1 depends so that
rubygems can perform certificate verification
- debian/rules: Don't install SSL certificates from upstream sources
- debian/patches/ 20120927- rubygems_ disable_ upstream_ certs.patch: Use
/etc/ssl/certs/ ca-certificates .crt for the trusted CA certificates.
* Drop debian/patches/ CVE-2013- 4164.patch; applied upstream.
* debian/patches/ 20131218- stack-size. patch: Increase thread stack
size on 64-bit platforms to prevent testsuite failure on ppc64el. - 30. By Marc Deslauriers
-
* SECURITY UPDATE: denial of service and possible code execution via
heap overflow in floating point parsing.
- debian/patches/ CVE-2013- 4164.patch: check lengths in util.c, added
test to test/ruby/test_float. rb.
- CVE-2013-4164 - 29. By Marc Deslauriers
-
* Merge from Debian. Remaining changes:
- debian/control: Add ca-certificates to libruby1.9.1 depends so that
rubygems can perform certificate verification
- debian/rules: Don't install SSL certificates from upstream sources
- debian/patches/ 20120927- rubygems_ disable_ upstream_ certs.patch: Use
/etc/ssl/certs/ ca-certificates .crt for the trusted CA certificates. - 28. By Marc Deslauriers
-
* SECURITY UPDATE: incorrect ssl hostname verification
- debian/patches/ CVE-2013- 4073.patch: fix hostname check and regression
in ext/openssl/lib/openssl/ ssl-internal. rb, added test to
test/openssl/ test_ssl. rb.
- CVE-2013-4073 - 27. By Marc Deslauriers
-
* Merge from Debian testing. Remaining changes:
- debian/control: Add ca-certificates to libruby1.9.1 depends so that
rubygems can perform certificate verification
- debian/rules: Don't install SSL certificates from upstream sources
- debian/patches/ 20120927- rubygems_ disable_ upstream_ certs.patch: Use
/etc/ssl/certs/ ca-certificates .crt for the trusted CA certificates.
- debian/patches/ CVE-2012- 4522.patch: Adjust patch to fix build test
error. Use the version of the fix from upstream's 1.9.3 tree to fix
the NoMethodError for assert_file_not, which doesn't exist in 1.9.3.
Adjust the Origin patch tag accordingly. - 26. By Tyler Hicks
-
* Merge from Debian testing (LP: #1131493). Remaining changes:
- debian/control: Add ca-certificates to libruby1.9.1 depends so that
rubygems can perform certificate verification
- debian/rules: Don't install SSL certificates from upstream sources
- debian/patches/ 20120927- rubygems_ disable_ upstream_ certs.patch: Use
/etc/ssl/certs/ ca-certificates .crt for the trusted CA certificates.
* Changes dropped:
- debian/patches/ 20121016- cve_2012_ 4522.patch: Debian is carrying a patch
for this issue.
- debian/patches/ 20121011- cve_2012_ 4464-cve_ 2012_4466. patch: Debian is
carrying a patch for this issue, but the patch is incorrectly named
20120927-cve_2011_ 1005.patch. I'll work with Debian to change the patch
name, but there's no need in carrying a delta because of this. To be
clear, the Ubuntu ruby1.9.1 package is patched for CVE-2012-4464 and
CVE-2012-4466, despite the incorrect patch name.
* debian/patches/ CVE-2012- 4522.patch: Adjust patch to fix build test error.
Use the version of the fix from upstream's 1.9.3 tree to fix the
NoMethodError for assert_file_not, which doesn't exist in 1.9.3. Adjust
the Origin patch tag accordingly. - 25. By Tyler Hicks
-
* SECURITY UPDATE: Safe level bypass
- debian/patches/ 20121011- cve_2012_ 4464-cve_ 2012_4466. patch: Remove
incorrect string taint in exception handling methods. Based on upstream
patch.
- CVE-2012-4464
- CVE-2012-4466
* SECURITY UPDATE: Missing input sanitization of file paths
- debian/patches/ 20121016- cve_2012_ 4522.patch: NUL characters are not
valid filename characters, so ensure that Ruby strings used for file
paths do not contain NUL characters. Based on upstream patch.
- CVE-2012-4522
* debian/patches/ 20120927- cve_2011_ 1005.patch: Drop since ruby1.9.x is
technically not affected by CVE-2011-1005. CVE-2012-4464 is the id
assigned to the vulnerability in the ruby1.9.x branch. - 24. By Tyler Hicks
-
* SECURITY UPDATE: Safe level bypass
- debian/patches/ 20120927- cve_2011_ 1005.patch: Remove incorrect string
taint in exception handling methods. Based on upstream patch.
- CVE-2011-1005
* Make the RubyGems fetcher use distro-provided ca-certificates
(LP: #1057926)
- debian/control: Add ca-certificates to libruby1.9.1 depends so that
rubygems can perform certificate verification
- debian/rules: Don't install SSL certificates from upstream sources
- debian/patches/ 20120927- rubygems_ disable_ upstream_ certs.patch: Use
/etc/ssl/certs/ ca-certificates .crt for the trusted CA certificates.
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later)
- Stacked on:
- lp://staging/ubuntu/trusty/ruby1.9.1