[ubuntu/bionic-security] ruby2.5 2.5.1-1ubuntu1.8 (Accepted)
Marc Deslauriers
marc.deslauriers at canonical.com
Thu Mar 18 16:47:37 UTC 2021
ruby2.5 (2.5.1-1ubuntu1.8) bionic-security; urgency=medium
* SECURITY UPDATE: Unsafe Object Creation Vulnerability in JSON gem
- debian/patches/CVE-2020-10663.patch: set json->create_additions to 0
in ext/json/parser/parser.c, ext/json/parser/parser.rl.
- CVE-2020-10663
* SECURITY UPDATE: sensitive info disclosure in BasicSocket#read_nonblock
- debian/patches/CVE-2020-10933.patch: do not return uninitialized
buffer in ext/socket/init.c.
- CVE-2020-10933
* SECURITY UPDATE: HTTP Request Smuggling attack in WEBrick
- debian/patches/CVE-2020-25613.patch: make it more strict to interpret
some headers in lib/webrick/httprequest.rb.
- CVE-2020-25613
ruby2.5 (2.5.1-1ubuntu1.7) bionic; urgency=medium
* d/p/arm64-optimizations.patch: enable arm64 optimizations that exist
for power/x86. It includes enabling unaligned memory access, gc and
vm_exec.c optimizations (LP: #1901074).
* Fix FTBFS, many tests were failing during the build (LP: #1903902).
- Add missing b-d on tzdata.
* Fix DEP-8 tests (LP: #1903905).
- Backport patches to fix Kiritimati TZ tests:
+ 0029-Backport-upstream-patch-to-fix-Kiritimati-TZ-test-1-.patch
+ 0030-Backport-upstream-patch-to-fix-Kiritimati-TZ-test-2-.patch
- d/t/control: add restriction to allow-stderr. The rubyconfig test calls
dpkg-architecture which is returning a warning in Bionic.
- d/t/bundled-gems: skip gems which do not match upstream expectations.
Some gems listed as bundled by upstream are not satisfied by the Ubuntu
Bionic archive.
Date: 2021-03-16 16:19:28.285265+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/ruby2.5/2.5.1-1ubuntu1.8
-------------- next part --------------
Sorry, changesfile not available.
More information about the Bionic-changes
mailing list