Change logs for ruby2.3 source package in Xenial

  • ruby2.3 (2.3.1-2~ubuntu16.04.16) xenial-security; urgency=medium
    
      * SECURITY UPDATE: XML round-trip vulnerability in REXML
        - debian/patches/CVE-2021-28965.patch: update to REXML 3.1.7.4.
        - CVE-2021-28965
    
     -- Marc Deslauriers <email address hidden>  Thu, 15 Apr 2021 10:39:41 -0400
  • ruby2.3 (2.3.1-2~ubuntu16.04.15) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Unsafe Object Creation Vulnerability in JSON gem
        - debian/patches/CVE-2020-10663.patch: set json->create_additions to 0
          in ext/json/parser/parser.c, ext/json/parser/parser.rl.
        - CVE-2020-10663
      * SECURITY UPDATE: HTTP Request Smuggling attack in WEBrick
        - debian/patches/CVE-2020-25613.patch: make it more strict to interpret
          some headers in lib/webrick/httprequest.rb.
        - CVE-2020-25613
    
     -- Marc Deslauriers <email address hidden>  Tue, 16 Mar 2021 11:03:56 -0400
  • ruby2.3 (2.3.1-2~ubuntu16.04.14) xenial-security; urgency=medium
    
      * SECURITY UPDATE: NULL injection vulnerability
        - debian/patches/CVE-2019-15845.patch: ensure that
          pattern does not contain a NULL character in dir.c,
          test/ruby/test_fnmatch.rb.
        - CVE-2019-15845
      * SECURITY UPDATE: Denial of service vulnerability
        - debian/patches/CVE-2019-16201.patch: fix in
          lib/webrick/httpauth/digestauth.rb,
          test/webrick/test_httpauth.rb.
        - CVE-2019-16201.patch
      * SECURITY UPDATE: HTTP response splitting in WEBrick
        - debian/patches/CVE-2019-16254.patch: prevent response
          splitting and header injection in lib/webrick/httpresponse.rb,
          test/webrick/test_httpresponse.rb.
        - CVE-2019-16254
      * SECURITY UPDATE: Code injection
        - debian/patches/CVE-2019-16255.patch: prevent unknown command
          in lib/shell/command-processor.rb, test/shell/test_command_processor.rb.
        - CVE-2019-16255
    
     -- <email address hidden> (Leonidas S. Barbosa)  Mon, 25 Nov 2019 12:24:34 -0300
  • ruby2.3 (2.3.1-2~ubuntu16.04.13) xenial; urgency=medium
    
      * d/p/do-not-wakeup-inside-child-processes.patch: avoid child ruby processes
        being stuck in a busy loop (LP: #1834072)
    
     -- Andreas Hasenack <email address hidden>  Tue, 25 Jun 2019 11:52:54 -0300
  • ruby2.3 (2.3.1-2~16.04.12) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Delete directory using symlink when decompressing tar,
        Escape sequence injection vulnerability in gem owner, Escape sequence
        injection vulnerability in API response handling, Arbitrary code exec,
        Escape sequence injection vulnerability in errors
        - debian/patches/CVE-2019-8320-25.patch: fix in
          lib/rubygems/command_manager.rb,
          lib/rubygems/commands/owner_command.rb,
          lib/rubygems/gemcutter_utilities.rb,
          lib/rubygems/installer.rb,
          lib/rubygems/package.rb,
          test/rubygems/test_gem_package.rb,
          test/rubygems/test_gem_installer.rb,
          test/rubygems/test_gem_text.rb.
        - CVE-2019-8320
        - CVE-2019-8321
        - CVE-2019-8322
        - CVE-2019-8323
        - CVE-2019-8324
        - CVE-2019-8325
      * Fixing expired certification that causes tests to fail
        - debian/patches/fixing_expired_SSL_certificates.patch: fix in
          test/net/imap/cacert.pen, test/net/imap/server.crt,
          test/net/imap/server.key.
      * Added lisbon_tz test to excluded tests
        - debian/patches/0001-excluding_lisbon_tz_test.patch:
          test/excludes/TestTimeTZ.rb.
      * Fixing symlink expanding issue that makes some tests and gems fails
        - debian/patches/fixing_symlink_expanding_issue.patch: fix in
          lib/rubygems/package.rb, test/rubygems/test_gem_package.rb.
    
     -- <email address hidden> (Leonidas S. Barbosa)  Wed, 03 Apr 2019 12:30:36 -0300
  • ruby2.3 (2.3.1-2~16.04.11) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Name equality check
        - debian/patches/CVE-2018-16395.patch: fix in
          ext/openssl/ossl_x509name.c.
        - CVE-2018-16395
      * SECURITY UPDATE: Tainted flags not propagted
        - debian/patches/CVE-2018-16396.patch: fix in
          pack.c, test/ruby/test_pack.rb.
        - CVE-2018-16396
      * fixing tz test issue
        - debian/patches/fixing_tz_tests.patch
    
     -- <email address hidden> (Leonidas S. Barbosa)  Tue, 30 Oct 2018 10:59:03 -0300
  • ruby2.3 (2.3.1-2~16.04.10) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Malicious format string - buffer overrun
        - debian/patches/CVE-2017-0898.patch: fix in sprintf.c,
          test/ruby/test_sprintf.rb.
        - CVE-2017-0898
      * SECURITY UPDATE: Response splitting attack
        - debian/patches/CVE-2017-17742.patch: fix in webrick/httpresponse.rb,
          test/webrick/test_httpresponse.rb.
        - CVE-2017-17742
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2018-8777*.patch: fix in lib/webrick/httpresponse.rb,
          lib/webrick/httpservlet/filehandler.rb,
          test/webrick/test_filehandler.rb, test/webrick/test_httpresponse.rb.
        - CVE-2018-8777
    
     -- <email address hidden> (Leonidas S. Barbosa)  Fri, 08 Jun 2018 11:24:57 -0300
  • ruby2.3 (2.3.1-2~16.04.9) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Directory traversal vulnerability
        - debian/patches/CVE-2018-6914.patch: fix in lib/tmpdir.rb,
          test/test_tempfile.rb.
        - CVE-2018-6914
      * SECURITY UPDATE: Buffer under-read
        - debian/patches/CVE-2018-8778.patch: fix in pack.c,
          test/ruby/test_pack.rb.
        - CVE-2018-8778
      * SECURITY UPDATE: Unintended socket
        - debian/patches/CVE-2018-8779.patch: fix in ext/socket/unixsocket.c,
          test/socket/test_unix.rb.
        - CVE-2018-8779
      * SECURITY UPDATE: Directory traversal
        - debian/patches/CVE-2018-8780.patch: fix in dir.c,
          test/ruby/test_dir.rb.
        - CVE-2018-8780
    
     -- <email address hidden> (Leonidas S. Barbosa)  Fri, 13 Apr 2018 11:38:20 -0300
  • ruby2.3 (2.3.1-2~16.04.7) xenial-security; urgency=medium
    
      * SECURITY UPDATE: Directory traversal
        - debian/patches/CVE-2018-1000073.patch: fix in
          lib/rubygems/package.rb.
        - CVE-2018-1000073
      * SECURITY UPDATE: Deserialization untrusted data
        - debian/patches/CVE-2018-1000074.patch fix in
          lib/rubygems/commands/owner_command.rb,
          test/rubygems/test_gem_commands_owner_command.rb.
        - CVE-2018-1000074
      * SECURITY UPDATE: Infinite loop
        - debian/patches/CVE-2018-1000075.patch: fix in
          lib/rubygems/package/tar_header.rb,
          test/rubygems/test_gem_package_tar_header.rb.
        - CVE-2018-1000075
      * SECURITY UPDATE: Improper verification of crypto
        signature
        - debian/patches/CVE-2018-1000076.patch: fix in
          lib/rubygems/package.rb, lib/rubygems/pacage/tar_writer.rb,
          test/rubygems/test_gem_pacakge.rg
        - CVE-2018-1000076
      * SECURITY UPDATE: Validation vulnerability
        - debian/patches/CVE-2018-1000077.patch: fix in
          lib/rubygems/specification.rb,
          test/rubygems/test_gem_specification.rb.
        - CVE-2018-1000077
      * SECURITY UPDATE: Cross site scripting
        - debian/patches/CVE-2018-1000078.patch: fix in
          lib/rubygems/server.rb.
        - CVE-2018-1000078
      * SECURITY UPDATE: Directory traversal
        - debian/patches/CVE-2018-1000079.patch: fix in
          lib/rubygems/package.rb.
        - CVE-2018-1000079
    
     -- <email address hidden> (Leonidas S. Barbosa)  Wed, 04 Apr 2018 12:16:06 -0300
  • ruby2.3 (2.3.1-2~16.04.6) xenial-security; urgency=medium
    
      * SECURITY UPDATE: fails to validade specification names
        - debian/patches/CVE-2017-0901-0902.patch:  fix this.
        - CVE-2017-0901
      * SECURITY UPDATE: vulnerable to a DNS hijacking
        - debian/patches/CVE-2017-0901-0902.patch fix this.
        - CVE-2017-0902
      * SECURITY UPDATE: possible remote code execution
        - debian/patches/CVE-2017-0903.patch: whitelist classes
          and symbols that are in Gem spec YAML in lib/rubygems.rb,
          lib/rubygens/config_file.rb, lib/rubygems/package.rb,
          lib/rubygems/package/old.rb, lib/rubygems/safe_yaml.rb,
          lib/rubygems/specification.rb.
        - CVE-2017-0903
    
     -- <email address hidden> (Leonidas S. Barbosa)  Tue, 30 Jan 2018 14:54:19 -0300
  • ruby2.3 (2.3.1-2~16.04.5) xenial-security; urgency=medium
    
      * SECURITY UPDATE: possible command injection attacks through
        kernel#open
        - debian/patches/CVE-2017-17790.patch: fix uses of Kernel#open in
          lib/resolv.rb.
        - CVE-2017-17790
      * SECURITY UPDATE: possibly execute arbitrary commands via a crafted user name
        - debian/patches/CVE-2017-10784.patch: sanitize any type of logs in
          lib/webrick/httpstatus.rb, lib/webrick/log.rb and test/webrick/test_httpauth.rb.
        - CVE-2017-10784
      * SECURITY UPDATE: denial of service via a crafted string
        - debian/patches/CVE-2017-14033.patch: fix in ext/openssl/ossl_asn1.c.
        - CVE-2017-14033
      * SECURITY UPDATE: Arbitrary memory expose during a JSON.generate call
        - debian/patches/CVE-2017-14064.patch: fix this in
          ext/json/ext/generator/generator.c and ext/json/ext/generator/generator.h.
    
     -- <email address hidden> (Leonidas S. Barbosa)  Tue, 09 Jan 2018 11:43:22 -0300
  • ruby2.3 (2.3.1-2~16.04.4) xenial-security; urgency=medium
    
      * SECURITY UPDATE: command injection through Net::FTP
        - debian/patches/CVE-2017-17405.patch: fix command injection
          in lib/net/ftp.rb, test/net/ftp/test_ftp.rb.
        - CVE-2017-17405
      *  Exclude some tests that fails in launchpad:
        - debian/patches/0090-Exclude-tests-that-fail-on-Ubuntu-builds.patch
    
     -- <email address hidden> (Leonidas S. Barbosa)  Mon, 18 Dec 2017 16:25:28 -0300
  • ruby2.3 (2.3.1-2~16.04.2) xenial-security; urgency=medium
    
      * SECURITY UPDATE: SMTP command injection
        - debian/patches/CVE-2015-9096.patch: don't allow bare CR or LF in
          lib/net/smtp.rb, added test to test/net/smtp/test_smtp.rb.
        - CVE-2015-9096
      * SECURITY UPDATE: use of same initialization vector (IV)
        - debian/patches/CVE-2016-7798.patch: don't set dummy key in
          ext/openssl/ossl_cipher.c, added test to test/openssl/test_cipher.rb.
        - CVE-2016-7798
      * debian/rules: enable full test suite
      * debian/control: added netbase to Build-Depends
      * debian/patches/fix_tests.patch: fix tests that do not work correctly.
    
     -- Marc Deslauriers <email address hidden>  Tue, 20 Jun 2017 11:05:02 -0400
  • ruby2.3 (2.3.1-2~16.04) xenial-proposed; urgency=medium
    
      * SRU: LP: #1589271, backport 2.3.1 to 16.04 LTS.
      * Fixes tests on s390x. LP: #1556783.
    
    ruby2.3 (2.3.1-2) unstable; urgency=medium
    
      [ Antonio Terceiro ]
      * debian/tests/known-failures.txt: remove test that now passes
        (test/rinda/test_rinda.rb)
      * debian/rules: enable bindnow hardening option (Closes: #822288)
      * debian/copyright: update and simplify copyright annotations for Unicode
        files under enc/trans/JIS/
      * Bump Standards-Version to 3.9.8 (no changes needed)
    
      [ Christian Hofstaedtler ]
      * Stop providing ruby-interpreter. Only packages providing
        /usr/bin/ruby can be a credible provider of ruby-interpreter.
        (Closes: #822072)
      * Raise priority to "optional", now that ruby2.2 is gone, although
        the value of this change is unclear. (Closes: #822911)
      * Apply patch from Reiner Herrmann <email address hidden> to help with
        reproducibility of mkmf.rb using packages. (Closes: #825569)
    
    ruby2.3 (2.3.1-1) unstable; urgency=medium
    
      * Call make install-doc, install-nodoc with V=1, for diagnosing
        build failures.
      * New upstream TEENY version.
    
     -- Matthias Klose <email address hidden>  Sun, 05 Jun 2016 17:50:45 +0200
  • ruby2.3 (2.3.0-5ubuntu1) xenial; urgency=medium
    
      * Merge with Debian; remaining changes:
        - Don't run tests on s390x, hanging on the buildds.
    
    ruby2.3 (2.3.0-5) unstable; urgency=medium
    
      * Set gzip embedded mtime field to fixed value for rdoc-generated
        compressed javascript data. Helps with reproducibility of rdoc-using
        packages.
      * Build tcltk extension for Tcl/Tk 8.6.
      * Apply patch from upstream to fix crash in Proc binding.
        (ruby-core: 74100, trunk r54128, bug #12137). (Closes: #816161)
    
     -- Matthias Klose <email address hidden>  Tue, 22 Mar 2016 16:21:08 +0100
  • ruby2.3 (2.3.0-5) unstable; urgency=medium
    
      * Set gzip embedded mtime field to fixed value for rdoc-generated
        compressed javascript data. Helps with reproducibility of rdoc-using
        packages.
      * Build tcltk extension for Tcl/Tk 8.6.
      * Apply patch from upstream to fix crash in Proc binding.
        (ruby-core: 74100, trunk r54128, bug #12137). (Closes: #816161)
    
     -- Christian Hofstaedtler <email address hidden>  Wed, 16 Mar 2016 23:36:12 +0000
  • ruby2.3 (2.3.0-4ubuntu3) xenial; urgency=medium
    
      * Build using Tcl/Tk 8.6.
    
     -- Matthias Klose <email address hidden>  Mon, 14 Mar 2016 11:25:22 +0100
  • ruby2.3 (2.3.0-4ubuntu2) xenial; urgency=medium
    
      * Don't run tests on s390x, hanging on the buildds.
      * Ignore test results on i386.
    
     -- Matthias Klose <email address hidden>  Mon, 14 Mar 2016 09:02:50 +0100
  • ruby2.3 (2.3.0-4ubuntu1) xenial; urgency=medium
    
      * Ignore test results on s390x.
    
     -- Matthias Klose <email address hidden>  Mon, 14 Mar 2016 09:02:50 +0100
  • ruby2.3 (2.3.0-4) unstable; urgency=medium
    
      * Apply patch from upstream to fix deserializing OpenStruct via Psych,
        (ruby-core: 72501, trunk r53366). (Closes: #816358)
    
     -- Christian Hofstaedtler <email address hidden>  Tue, 01 Mar 2016 22:41:19 +0100
  • ruby2.3 (2.3.0-2) unstable; urgency=medium
    
      * debian/libruby2.3.symbols: update with new symbols introduced right before
        the final 2.3.0 release.
      * libruby2.3: add dependencies on rake, ruby-did-you-mean and
        ruby-net-telnet
    
     -- Antonio Terceiro <email address hidden>  Sat, 30 Jan 2016 09:20:31 -0200
  • ruby2.3 (2.3.0-1) unstable; urgency=medium
    
      [ Antonio Terceiro ]
      * Ruby 2.3
      * debian/tests/bundled-gems: check if all libraries that are supposed to be
        bundled are present, with a version greater than or equal to the one
        specified in gems/bundled_gems
      * debian/tests/run-all: filter failures against list of known failures. Pass
        if only the tests listed in debian/tests/known-failures.txt fail, fail
        otherwise. This will help catch regressions.
      * debian/copyright: update wrt new files in the distribution
    
      [ Christian Hofstaedtler ]
      * autopkgtest: depend on all packages so we actually have header files
        installed.
    
     -- Antonio Terceiro <email address hidden>  Mon, 28 Dec 2015 09:17:47 -0300