-
ruby2.7 (2.7.0-5ubuntu1.12) focal-security; urgency=medium
* SECURITY UPDATE: ReDoS
- debian/patches/CVE-2023-36617.patch: changes regex behaviour
in lib/url/rfc2396_parser.rb, lib/uri/rfc3986_parser.rb.
- CVE-2023-36617
-- Leonidas Da Silva Barbosa <email address hidden> Thu, 06 Jul 2023 07:57:08 -0300
-
ruby2.7 (2.7.0-5ubuntu1.11) focal; urgency=medium
* d/p/0026-reload-AR-table-body-for-transient-heap.patch: Fix hash iteration
(LP: #2018215).
-- Lucas Kanashiro <email address hidden> Wed, 03 May 2023 04:51:06 -0300
-
ruby2.7 (2.7.0-5ubuntu1.10) focal-security; urgency=medium
* SECURITY REGRESSION: URI.parse returning empty when it should return nil
- reverting/removing patches for CVE-2023-28755-*.patch that changed the
regex behaviour causing URI.parse to return '' instead previous
behaviour nil as some applications expected to use the last one as
return (LP: #2018547)
-- Leonidas Da Silva Barbosa <email address hidden> Fri, 05 May 2023 04:37:32 -0300
-
ruby2.7 (2.7.0-5ubuntu1.9) focal-security; urgency=medium
* SECURITY UPDATE: ReDoS
- debian/patches/CVE-2023-28755-*.patch: URI.parse should set empty
string in host instead of nil in lib/uri/rfc3986_parser.rb, raise
ArgumentError with empty host url again in
lib/net/http/generic_request.rb.
- CVE-2023-28755
* SECURITY UPDATE: ReDos
- debian/patches/CVE-2023-28756-*.patch: fix quadratic backtracking on
invalid time and make RFC2822 regexp linear in lib/time.rb.
- CVE-2023-28756
* debian/patches/fix_test_generic.patch: fix test generic.
-- Leonidas Da Silva Barbosa <email address hidden> Tue, 02 May 2023 05:34:05 -0300
-
ruby2.7 (2.7.0-5ubuntu1.8) focal-security; urgency=medium
* SECURITY UPDATE: HTTP response splitting
- debian/patches/CVE-2021-33621*.patch: adds regex to lib/cgi/core.rb and
lib/cgi/cookie.rb along with tests to check http response headers and
cookie fields for invalid characters.
- CVE-2021-33621
-- Leonidas Da Silva Barbosa <email address hidden> Thu, 16 Mar 2023 07:49:39 -0300
-
ruby2.7 (2.7.0-5ubuntu1.7) focal-security; urgency=medium
* SECURITY UPDATE: Buffer over-read
- debian/patches/CVE-2022-28739.patch: fix dtoa buffer
overrun in missing/dtoa.c, test/ruby/test_float.rb.
- CVE-2022-28739
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 23 May 2022 16:07:39 -0300
-
ruby2.7 (2.7.0-5ubuntu1.6) focal-security; urgency=medium
* SECURITY UPDATE: Buffer overrun
- debian/patches/CVE-2021-41816.patch: fix integer overflow making
sure use of the check in rb_alloc_tmp_buffer2 in
ext/cgi/escape/escape.c.
- CVE-2021-41816
* SECURITY UPDATE: ReDoS vulnerability
- debian/patches/CVE-2021-41817-*.patch: add length limit option
for methods that parses date strings and mimic prev behaviour
in ext/date/date_core.c, test/date/test_date_parse.rb.
- CVE-2021-41817
* SECURITY UPDATE: Mishandles sec prefixes in cookie names
- debian/patches/CVE-2021-41819.patch: when parsing cookies, only
decode the values in lib/cgi/cookie.rb, test/cgi/test_cgi_cookie.rb.
- CVE-2021-41819
-- Leonidas Da Silva Barbosa <email address hidden> Thu, 06 Jan 2022 09:34:12 -0300
-
ruby2.7 (2.7.0-5ubuntu1.5) focal-security; urgency=medium
* SECURITY UPDATE: Command injection vulnerability in RDoc
- debian/patches/CVE-2021-31799.patch: fix replace open for File.open
in lib/rdoc/rdoc.rb, test/rdoc/test_rdoc_rdoc.rb.
- CVE-2021-31799
* SECURITY UPDATE: Information leak
- debian/patches/CVE-2021-31810.patch: ignore IP address in PASV
responses by default and add new option use_pasv_ip in lib/net/ftp.rb,
test/net/ftp/test_ftp.rb.
- CVE-2021-31810
* SECURITY UPDATE: Stripping vulnerability
- debian/patches/CVE-2021-32066.patch: fix raising an exception
when a unknow response error happens in
lib/net/imap.rb, test/net/imap/test_imap.rb.
- CVE-2021-32066
-- Leonidas Da Silva Barbosa <email address hidden> Thu, 15 Jul 2021 16:18:39 -0300
-
ruby2.7 (2.7.0-5ubuntu1.4) focal-security; urgency=medium
* SECURITY UPDATE: XML round-trip vulnerability in REXML
- debian/patches/CVE-2021-28965.patch: backport fixes from REXML
3.2.3.1.
- CVE-2021-28965
-- Marc Deslauriers <email address hidden> Thu, 15 Apr 2021 10:38:03 -0400
-
ruby2.7 (2.7.0-5ubuntu1.3) focal-security; urgency=medium
* SECURITY UPDATE: sensitive info disclosure in BasicSocket#read_nonblock
- debian/patches/CVE-2020-10933.patch: do not return uninitialized
buffer in ext/socket/init.c.
- CVE-2020-10933
* SECURITY UPDATE: HTTP Request Smuggling attack in WEBrick
- debian/patches/CVE-2020-25613.patch: make it more strict to interpret
some headers in lib/webrick/httprequest.rb.
- CVE-2020-25613
-- Marc Deslauriers <email address hidden> Tue, 16 Mar 2021 10:56:44 -0400
-
ruby2.7 (2.7.0-5ubuntu1.2) focal; urgency=medium
* d/p/arm64-optimizations.patch: enable arm64 optimizations that exist for
power/x86. It includes enabling unaligned memory access, gc and vm_exec.c
optimizations (LP: #1901074).
-- Lucas Kanashiro <email address hidden> Wed, 14 Oct 2020 14:55:55 -0300
-
ruby2.7 (2.7.0-5ubuntu1.1) focal; urgency=medium
* d/control: do not provide ruby-bundler (LP: #1876912).
libruby2.7 provides only ruby-bundler library and not its binary.
-- Lucas Kanashiro <email address hidden> Tue, 05 May 2020 15:12:42 -0300
-
ruby2.7 (2.7.0-5ubuntu1) focal; urgency=medium
[ Gianfranco Costamagna ]
* Merge from sid, remanining changes:
- fix up symbols files
- fix riscv64 build
[ William Grant ]
* Make 64-bit-only symbols optional to fix FTBFS on i386/armhf.
-- William Grant <email address hidden> Mon, 20 Apr 2020 10:57:17 +1000
-
ruby2.7 (2.7.0-4ubuntu1) focal; urgency=medium
* Build with -latomic on riscv64.
* Disable some tests that fail or time out on riscv64.
-- William Grant <email address hidden> Sat, 21 Mar 2020 15:59:03 +1100
-
ruby2.7 (2.7.0-4) unstable; urgency=medium
* mipsel: exclude test that fails on buildd
-- Antonio Terceiro <email address hidden> Wed, 19 Feb 2020 08:05:27 -0300
-
ruby2.7 (2.7.0-3) unstable; urgency=medium
* Fix priority order of paths in -I option
-- Cédric Boutillier <email address hidden> Tue, 04 Feb 2020 18:58:15 +0100
-
ruby2.7 (2.7.0-2) unstable; urgency=medium
* Fix symbols file using dpkg-gensymbols (Closes: #948371)
* debian/rules: fix dh_auto_clean override (Closes: #948187)
* debian/tests/run-all: copy tool/ to $AUTOPKGTEST_TMP
* Exclude some failing tests when executed via autopkgtest
* Set OPENSSL_CONF to lower security level to 1
* Skip some tests that need root permission to pass
-- Lucas Kanashiro <email address hidden> Wed, 22 Jan 2020 11:47:11 -0300
-
ruby2.7 (2.7.0-1ubuntu3) focal; urgency=medium
* Re-upload to build on i386.
-- Matthias Klose <email address hidden> Wed, 22 Jan 2020 07:17:25 +0100
-
ruby2.7 (2.7.0-1ubuntu2) focal; urgency=medium
* Set OPENSSL_CONF to lower security level to 1, to allow tests pass
with weak keys.
* Update symbols file.
-- Matthias Klose <email address hidden> Thu, 16 Jan 2020 09:48:20 +0100
-
ruby2.7 (2.7.0-1ubuntu1) focal; urgency=medium
* Set OPENSSL_CONF to lower security level to 1, to allow tests pass
with weak keys.
* Update symbols file.
-- Matthias Klose <email address hidden> Thu, 16 Jan 2020 09:48:20 +0100
-
ruby2.7 (2.7.0-1build1) focal; urgency=medium
* No-change rebuild for libffi soname change.
-- Matthias Klose <email address hidden> Sun, 12 Jan 2020 08:30:29 +0000
-
ruby2.7 (2.7.0-1) unstable; urgency=medium
* No changes rebuild
-- Lucas Kanashiro <email address hidden> Tue, 07 Jan 2020 16:20:19 -0300