[ubuntu/raring-proposed] ruby1.9.1 1.9.3.194-7ubuntu1 (Accepted)

Tyler Hicks tyhicks at canonical.com
Fri Feb 22 19:16:33 UTC 2013


ruby1.9.1 (1.9.3.194-7ubuntu1) raring; urgency=low

  * Merge from Debian testing (LP: #1131493). Remaining changes:
    - debian/control: Add ca-certificates to libruby1.9.1 depends so that
      rubygems can perform certificate verification
    - debian/rules: Don't install SSL certificates from upstream sources
    - debian/patches/20120927-rubygems_disable_upstream_certs.patch: Use
      /etc/ssl/certs/ca-certificates.crt for the trusted CA certificates.
  * Changes dropped:
    - debian/patches/20121016-cve_2012_4522.patch: Debian is carrying a patch
      for this issue.
    - debian/patches/20121011-cve_2012_4464-cve_2012_4466.patch: Debian is
      carrying a patch for this issue, but the patch is incorrectly named
      20120927-cve_2011_1005.patch. I'll work with Debian to change the patch
      name, but there's no need in carrying a delta because of this. To be
      clear, the Ubuntu ruby1.9.1 package is patched for CVE-2012-4464 and
      CVE-2012-4466, despite the incorrect patch name.
  * debian/patches/CVE-2012-4522.patch: Adjust patch to fix build test error.
    Use the version of the fix from upstream's 1.9.3 tree to fix the
    NoMethodError for assert_file_not, which doesn't exist in 1.9.3. Adjust
    the Origin patch tag accordingly.

ruby1.9.1 (1.9.3.194-7) unstable; urgency=high

  * debian/patches/CVE-2013-0269.patch: fix possible denial of service and
    unsafe object creation vulnerability in JSON (Closes: #700471)

ruby1.9.1 (1.9.3.194-6) unstable; urgency=high

  [Nobuhiro Iwamatsu]
  * debian/patches/CVE-2013-0256.patch: fix possible cross site scripting
    vulnerability in documentation generated by RDOC (Closes: #699929)

ruby1.9.1 (1.9.3.194-5) unstable; urgency=high

  * Disable running the test suite during the build on sparc again. Keeping
    urgency=high because the previous release, which contains a security bug
    fix, did not reach testing yet because of a segfault when running tests in
    the sparc buildd.

ruby1.9.1 (1.9.3.194-4) unstable; urgency=high

  [ James Healy ]
  * debian/patches/CVE-2012-5371.patch: avoid DOS vulnerability in hash
    implementation, this fixes CVE-2012-5371. (Closes: #693024).

ruby1.9.1 (1.9.3.194-3) unstable; urgency=high

  * debian/patches/CVE-2012-4522.patch: avoid vulnerability with strings
    containing NUL bytes passed to file creation methods. This fixes
    CVE-2012-4522 (Closes: #690670).

ruby1.9.1 (1.9.3.194-2) unstable; urgency=low

  * debian/patches/20120927-cve_2011_1005.patch: patch sent by upstream;
    fixes CVE-2011-1005 which was thought of as not affecting the Ruby 1.9.x
    series (Closes: #689075). Thanks to Tyler Hicks <tyhicks at canonical.com>
    for reporting the issue.

Date: Thu, 21 Feb 2013 17:11:23 -0800
Changed-By: Tyler Hicks <tyhicks at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/raring/+source/ruby1.9.1/1.9.3.194-7ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 21 Feb 2013 17:11:23 -0800
Source: ruby1.9.1
Binary: ruby1.9.1 libruby1.9.1 libruby1.9.1-dbg ruby1.9.1-dev libtcltk-ruby1.9.1 ruby1.9.1-examples ri1.9.1 ruby1.9.1-full ruby1.9.3
Architecture: source
Version: 1.9.3.194-7ubuntu1
Distribution: raring
Urgency: high
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Tyler Hicks <tyhicks at canonical.com>
Description: 
 libruby1.9.1 - Libraries necessary to run Ruby 1.9.1
 libruby1.9.1-dbg - Debugging symbols for Ruby 1.9.1
 libtcltk-ruby1.9.1 - Tcl/Tk interface for Ruby 1.9.1
 ri1.9.1    - Ruby Interactive reference (for Ruby 1.9.1)
 ruby1.9.1  - Interpreter of object-oriented scripting language Ruby
 ruby1.9.1-dev - Header files for compiling extension modules for the Ruby 1.9.1
 ruby1.9.1-examples - Examples for Ruby 1.9
 ruby1.9.1-full - Ruby 1.9.1 full installation
 ruby1.9.3  - Interpreter of object-oriented scripting language Ruby, version 1
Closes: 689075 690670 693024 699929 700471
Launchpad-Bugs-Fixed: 1131493
Changes: 
 ruby1.9.1 (1.9.3.194-7ubuntu1) raring; urgency=low
 .
   * Merge from Debian testing (LP: #1131493). Remaining changes:
     - debian/control: Add ca-certificates to libruby1.9.1 depends so that
       rubygems can perform certificate verification
     - debian/rules: Don't install SSL certificates from upstream sources
     - debian/patches/20120927-rubygems_disable_upstream_certs.patch: Use
       /etc/ssl/certs/ca-certificates.crt for the trusted CA certificates.
   * Changes dropped:
     - debian/patches/20121016-cve_2012_4522.patch: Debian is carrying a patch
       for this issue.
     - debian/patches/20121011-cve_2012_4464-cve_2012_4466.patch: Debian is
       carrying a patch for this issue, but the patch is incorrectly named
       20120927-cve_2011_1005.patch. I'll work with Debian to change the patch
       name, but there's no need in carrying a delta because of this. To be
       clear, the Ubuntu ruby1.9.1 package is patched for CVE-2012-4464 and
       CVE-2012-4466, despite the incorrect patch name.
   * debian/patches/CVE-2012-4522.patch: Adjust patch to fix build test error.
     Use the version of the fix from upstream's 1.9.3 tree to fix the
     NoMethodError for assert_file_not, which doesn't exist in 1.9.3. Adjust
     the Origin patch tag accordingly.
 .
 ruby1.9.1 (1.9.3.194-7) unstable; urgency=high
 .
   * debian/patches/CVE-2013-0269.patch: fix possible denial of service and
     unsafe object creation vulnerability in JSON (Closes: #700471)
 .
 ruby1.9.1 (1.9.3.194-6) unstable; urgency=high
 .
   [Nobuhiro Iwamatsu]
   * debian/patches/CVE-2013-0256.patch: fix possible cross site scripting
     vulnerability in documentation generated by RDOC (Closes: #699929)
 .
 ruby1.9.1 (1.9.3.194-5) unstable; urgency=high
 .
   * Disable running the test suite during the build on sparc again. Keeping
     urgency=high because the previous release, which contains a security bug
     fix, did not reach testing yet because of a segfault when running tests in
     the sparc buildd.
 .
 ruby1.9.1 (1.9.3.194-4) unstable; urgency=high
 .
   [ James Healy ]
   * debian/patches/CVE-2012-5371.patch: avoid DOS vulnerability in hash
     implementation, this fixes CVE-2012-5371. (Closes: #693024).
 .
 ruby1.9.1 (1.9.3.194-3) unstable; urgency=high
 .
   * debian/patches/CVE-2012-4522.patch: avoid vulnerability with strings
     containing NUL bytes passed to file creation methods. This fixes
     CVE-2012-4522 (Closes: #690670).
 .
 ruby1.9.1 (1.9.3.194-2) unstable; urgency=low
 .
   * debian/patches/20120927-cve_2011_1005.patch: patch sent by upstream;
     fixes CVE-2011-1005 which was thought of as not affecting the Ruby 1.9.x
     series (Closes: #689075). Thanks to Tyler Hicks <tyhicks at canonical.com>
     for reporting the issue.
Checksums-Sha1: 
 59a84640c960db7c1ea9d38637dfeb235bca5b40 2741 ruby1.9.1_1.9.3.194-7ubuntu1.dsc
 31cf6bd981e4c929e5dc3bbdb341833eab1bd9f2 12432239 ruby1.9.1_1.9.3.194.orig.tar.gz
 916845120ed873870b0ca8b885e470a24beb9582 63069 ruby1.9.1_1.9.3.194-7ubuntu1.debian.tar.gz
Checksums-Sha256: 
 1a063ec5ed78a2c91a8bfdac4655dd74917628097d3b6c8c9d7494510fa8fa8e 2741 ruby1.9.1_1.9.3.194-7ubuntu1.dsc
 46e2fa80be7efed51bd9cdc529d1fe22ebc7567ee0f91db4ab855438cf4bd8bb 12432239 ruby1.9.1_1.9.3.194.orig.tar.gz
 f0aace5a1de6b782ff20f6f148b2ba85f64485c7509023f5cda1544c8ba8ac0b 63069 ruby1.9.1_1.9.3.194-7ubuntu1.debian.tar.gz
Files: 
 1d848cb12ff26049ecd6681c1c3cebe4 2741 ruby optional ruby1.9.1_1.9.3.194-7ubuntu1.dsc
 bc0c715c69da4d1d8bd57069c19f6c0e 12432239 ruby optional ruby1.9.1_1.9.3.194.orig.tar.gz
 1708149d3ba2461cf9c8647c6dceddf6 63069 ruby optional ruby1.9.1_1.9.3.194-7ubuntu1.debian.tar.gz
Original-Maintainer: akira yamada <akira at debian.org>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
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=7sXn
-----END PGP SIGNATURE-----


More information about the Raring-changes mailing list