[ubuntu/bionic-security] ruby2.5 2.5.1-1ubuntu1.8 (Accepted)

Marc Deslauriers marc.deslauriers at canonical.com
Thu Mar 18 16:47:37 UTC 2021


ruby2.5 (2.5.1-1ubuntu1.8) bionic-security; urgency=medium

  * SECURITY UPDATE: Unsafe Object Creation Vulnerability in JSON gem
    - debian/patches/CVE-2020-10663.patch: set json->create_additions to 0
      in ext/json/parser/parser.c, ext/json/parser/parser.rl.
    - CVE-2020-10663
  * SECURITY UPDATE: sensitive info disclosure in BasicSocket#read_nonblock
    - debian/patches/CVE-2020-10933.patch: do not return uninitialized
      buffer in ext/socket/init.c.
    - CVE-2020-10933
  * SECURITY UPDATE: HTTP Request Smuggling attack in WEBrick
    - debian/patches/CVE-2020-25613.patch: make it more strict to interpret
      some headers in lib/webrick/httprequest.rb.
    - CVE-2020-25613

ruby2.5 (2.5.1-1ubuntu1.7) bionic; urgency=medium

  * d/p/arm64-optimizations.patch: enable arm64 optimizations that exist
    for power/x86. It includes enabling unaligned memory access, gc and
    vm_exec.c optimizations (LP: #1901074).
  * Fix FTBFS, many tests were failing during the build (LP: #1903902).
    - Add missing b-d on tzdata.
  * Fix DEP-8 tests (LP: #1903905).
    - Backport patches to fix Kiritimati TZ tests:
      + 0029-Backport-upstream-patch-to-fix-Kiritimati-TZ-test-1-.patch
      + 0030-Backport-upstream-patch-to-fix-Kiritimati-TZ-test-2-.patch
    - d/t/control: add restriction to allow-stderr. The rubyconfig test calls
      dpkg-architecture which is returning a warning in Bionic.
    - d/t/bundled-gems: skip gems which do not match upstream expectations.
      Some gems listed as bundled by upstream are not satisfied by the Ubuntu
      Bionic archive.

Date: 2021-03-16 16:19:28.285265+00:00
Changed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/ruby2.5/2.5.1-1ubuntu1.8
-------------- next part --------------
Sorry, changesfile not available.


More information about the Bionic-changes mailing list