Package "libruby2.5"
Name: |
libruby2.5
|
Description: |
Libraries necessary to run Ruby 2.5
|
Latest version: |
2.5.1-1ubuntu1.16 |
Release: |
bionic (18.04) |
Level: |
updates |
Repository: |
main |
Head package: |
ruby2.5 |
Homepage: |
http://www.ruby-lang.org/ |
Links
Download "libruby2.5"
Other versions of "libruby2.5" in Bionic
Changelog
ruby2.5 (2.5.1-1ubuntu1.11) bionic-security; urgency=medium
* SECURITY UPDATE: ReDoS vulnerability
- debian/patches/CVE-2021-41817-*.patch: add length limit option
for methods that parses date strings and mimic prev behaviour
in ext/date/date_core.c, test/date/test_date_parse.rb.
- CVE-2021-41817
* SECURITY UPDATE: Mishandles sec prefixes in cookie names
- debian/patches/CVE-2021-41819.patch: when parsing cookies, only
decode the values in lib/cgi/cookie.rb, test/cgi/test_cgi_cookie.rb.
- CVE-2021-41819
-- Leonidas Da Silva Barbosa <email address hidden> Thu, 06 Jan 2022 12:31:02 -0300
|
Source diff to previous version |
|
ruby2.5 (2.5.1-1ubuntu1.10) bionic-security; urgency=medium
* SECURITY UPDATE: Command injection vulnerability in RDoc
- debian/patches/CVE-2021-31799.patch: fix replace open for File.open
in lib/rdoc/rdoc.rb, test/rdoc/test_rdoc_rdoc.rb.
- CVE-2021-31799
* SECURITY UPDATE: Information leak
- debian/patches/CVE-2021-31810.patch: ignore IP address in PASV
responses by default and add new option use_pasv_ip in lib/net/ftp.rb,
test/net/ftp/test_ftp.rb.
- CVE-2021-31810
* SECURITY UPDATE: Stripping vulnerability
- debian/patches/CVE-2021-32066.patch: fix raising an exception
when a unknow response error happens in
lib/net/imap.rb, test/net/imap/test_imap.rb.
- CVE-2021-32066
* debian/patches/fixing_test_imap.patch: adds start_server to
IMAPTest in order to test_starttls_stripping runs properly.
-- Leonidas Da Silva Barbosa <email address hidden> Thu, 15 Jul 2021 14:22:59 -0300
|
Source diff to previous version |
CVE-2021-31799 |
A command injection vulnerability in RDoc |
CVE-2021-31810 |
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick |
CVE-2021-32066 |
A StartTLS stripping vulnerability in Net::IMAP |
|
ruby2.5 (2.5.1-1ubuntu1.9) bionic-security; urgency=medium
* SECURITY UPDATE: XML round-trip vulnerability in REXML
- debian/patches/CVE-2021-28965.patch: update to REXML 3.1.7.4.
- CVE-2021-28965
-- Marc Deslauriers <email address hidden> Thu, 15 Apr 2021 10:09:08 -0400
|
Source diff to previous version |
ruby2.5 (2.5.1-1ubuntu1.8) bionic-security; urgency=medium
* SECURITY UPDATE: Unsafe Object Creation Vulnerability in JSON gem
- debian/patches/CVE-2020-10663.patch: set json->create_additions to 0
in ext/json/parser/parser.c, ext/json/parser/parser.rl.
- CVE-2020-10663
* SECURITY UPDATE: sensitive info disclosure in BasicSocket#read_nonblock
- debian/patches/CVE-2020-10933.patch: do not return uninitialized
buffer in ext/socket/init.c.
- CVE-2020-10933
* SECURITY UPDATE: HTTP Request Smuggling attack in WEBrick
- debian/patches/CVE-2020-25613.patch: make it more strict to interpret
some headers in lib/webrick/httprequest.rb.
- CVE-2020-25613
-- Marc Deslauriers <email address hidden> Tue, 16 Mar 2021 10:59:21 -0400
|
Source diff to previous version |
CVE-2020-10663 |
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulne |
CVE-2020-10933 |
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buff |
CVE-2020-25613 |
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not |
|
ruby2.5 (2.5.1-1ubuntu1.7) bionic; urgency=medium
* d/p/arm64-optimizations.patch: enable arm64 optimizations that exist
for power/x86. It includes enabling unaligned memory access, gc and
vm_exec.c optimizations (LP: #1901074).
* Fix FTBFS, many tests were failing during the build (LP: #1903902).
- Add missing b-d on tzdata.
* Fix DEP-8 tests (LP: #1903905).
- Backport patches to fix Kiritimati TZ tests:
+ 0029-Backport-upstream-patch-to-fix-Kiritimati-TZ-test-1-.patch
+ 0030-Backport-upstream-patch-to-fix-Kiritimati-TZ-test-2-.patch
- d/t/control: add restriction to allow-stderr. The rubyconfig test calls
dpkg-architecture which is returning a warning in Bionic.
- d/t/bundled-gems: skip gems which do not match upstream expectations.
Some gems listed as bundled by upstream are not satisfied by the Ubuntu
Bionic archive.
-- Lucas Kanashiro <email address hidden> Thu, 05 Nov 2020 10:30:22 -0300
|
1901074 |
[SRU] Enable some arm64 performance optimizations already available for other architectures |
1903902 |
[SRU] ruby2.5 FTBFS in Bionic |
1903905 |
[SRU] ruby2.5 DEP-8 tests are failing in Bionic |
|
About
-
Send Feedback to @ubuntu_updates