ruby2.3 (2.3.3-1+deb9u9) stretch-security; urgency=high
authorUtkarsh Gupta <utkarsh@debian.org>
Thu, 1 Oct 2020 13:24:55 +0000 (14:24 +0100)
committerUtkarsh Gupta <utkarsh@debian.org>
Thu, 1 Oct 2020 13:24:55 +0000 (14:24 +0100)
commit3f080256c0960b5d5155f44ef2d382a4e8fc7282
tree503a5f421517cb8a845d26097225fef86a860869
parent4a43f3bf316265e37a004e4e49743f2d5f79af16
parent3087fa8f9a38735229be2ab3268a364c037914bb
ruby2.3 (2.3.3-1+deb9u9) stretch-security; urgency=high

  * Non-maintainer upload by the LTS team.
  * Add patch to fix a potential HTTP request smuggling
    vulnerability in WEBrick. (Fixes: CVE-2020-25613)

[dgit import unpatched ruby2.3 2.3.3-1+deb9u9]
47 files changed:
debian/README.porting
debian/README.source
debian/TODO
debian/changelog
debian/compat
debian/control
debian/copyright
debian/deleted_on_clean.txt
debian/docs
debian/gbp.conf
debian/libruby.stp
debian/libruby2.3.install
debian/libruby2.3.lintian-overrides
debian/libruby2.3.symbols
debian/manpages/gem2.3.1
debian/manpages/gem2.3.rd
debian/manpages/rdoc2.3.1
debian/manpages/rdoc2.3.rd
debian/manpages/testrb2.3.1
debian/manpages/testrb2.3.rd
debian/missing-sources/jquery.js
debian/newruby
debian/patches/CVE-2019-8320-25.patch
debian/patches/CVE-2020-10663.patch
debian/patches/CVE-2020-25613.patch
debian/patches/Fix-for-wrong-fnmatch-patttern.patch
debian/patches/Loop-with-String-scan-without-creating-substrings.patch
debian/patches/WEBrick-prevent-response-splitting-and-header-inject.patch
debian/patches/debian-changes
debian/patches/lib-shell-command-processor.rb-Shell-prevent-unknown.patch
debian/patches/series
debian/quick-build.sh
debian/ruby2.3-dev.install
debian/ruby2.3.install
debian/ruby2.3.lintian-overrides
debian/ruby2.3.manpages
debian/rules
debian/sanity_check
debian/source/format
debian/split-tk-out.rb
debian/tests/bundled-gems
debian/tests/control
debian/tests/known-failures.txt
debian/tests/run-all
debian/upstream-changes
debian/upstream-changes.blacklist
debian/watch