ruby2.3.git
5 years ago[PATCH] Make it more strict to interpret some headers
Yusuke Endoh [Tue, 29 Sep 2020 04:15:58 +0000 (13:15 +0900)]
[PATCH] Make it more strict to interpret some headers

Some regexps were too tolerant.

Gbp-Pq: Name CVE-2020-25613.patch

5 years ago[PATCH] merge revision(s) 36e9ed7fef6eb2d14becf6c52452e4ab16e4bf01: [Backport #16698]
usa [Mon, 30 Mar 2020 22:22:10 +0000 (22:22 +0000)]
[PATCH] merge revision(s) 36e9ed7fef6eb2d14becf6c52452e4ab16e4bf01: [Backport #16698]

        backport 80b5a0ff2a7709367178f29d4ebe1c54122b1c27 partially as a
         securify fix for CVE-2020-10663. The patch was provided by Jeremy Evans.

        git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/branches/ruby_2_6@67856 b2dd03c8-39d4-4d8f-98ff-823fe69b080e

git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/branches/ruby_2_5@67869 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
Author: Utkarsh Gupta <utkarsh@debian.org>

Gbp-Pq: Name CVE-2020-10663.patch

5 years agolib/shell/command-processor.rb (Shell#[]): prevent unknown command
usa [Tue, 1 Oct 2019 11:01:53 +0000 (11:01 +0000)]
lib/shell/command-processor.rb (Shell#[]): prevent unknown command

Origin: https://github.com/ruby/ruby/commit/3af01ae1101e0b8815ae5a106be64b0e82a58640
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2019-16255

`FileTest.send(command, ...)` allows to call not only FileTest-related
methods but also any method that belongs to Kernel, Object, etc.
patched by <mame@ruby-lang.org>

git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/branches/ruby_2_5@67814 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
[Salvatore Bonaccorso: Backport to 2.3.3:
 - Context changes in test/shell/test_command_processor.rb
]

Gbp-Pq: Name lib-shell-command-processor.rb-Shell-prevent-unknown.patch

5 years agoWEBrick: prevent response splitting and header injection
Yusuke Endoh [Tue, 1 Oct 2019 03:29:18 +0000 (12:29 +0900)]
WEBrick: prevent response splitting and header injection

Origin: https://github.com/ruby/ruby/commit/3ce238b5f9795581eb84114dcfbdf4aa086bfecc
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2019-16254

This is a follow up to d9d4a28f1cdd05a0e8dabb36d747d40bbcc30f16.
The commit prevented CRLR, but did not address an isolated CR or an
isolated LF.

Co-Authored-By: NARUSE, Yui <naruse@airemix.jp>
[Salvatore Bonaccorso: Backport to 2.3.3:
 - Context changes in test/webrick/test_httpresponse.rb
]

Gbp-Pq: Name WEBrick-prevent-response-splitting-and-header-inject.patch

5 years agoLoop with String#scan without creating substrings
Nobuyoshi Nakada [Tue, 13 Aug 2019 03:14:28 +0000 (12:14 +0900)]
Loop with String#scan without creating substrings

Origin: https://github.com/ruby/ruby/commit/36e057e26ef2104bc2349799d6c52d22bb1c7d03
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2019-16201

Create the substrings necessary parts only, instead of cutting the
rest of the buffer.  Also removed a useless, probable typo, regexp.

Gbp-Pq: Name Loop-with-String-scan-without-creating-substrings.patch

5 years agoFix for wrong fnmatch patttern
Nobuyoshi Nakada [Wed, 12 Dec 2018 05:38:09 +0000 (14:38 +0900)]
Fix for wrong fnmatch patttern

Origin: https://github.com/ruby/ruby/commit/a0a2640b398cffd351f87d3f6243103add66575b
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2019-15845

* dir.c (file_s_fnmatch): ensure that pattern does not contain a
  NUL character.  https://hackerone.com/reports/449617

Gbp-Pq: Name Fix-for-wrong-fnmatch-patttern.patch

5 years agoCVE-2019-8320-25
Antonio Terceiro [Thu, 1 Oct 2020 13:24:55 +0000 (14:24 +0100)]
CVE-2019-8320-25

Backport of https://github.com/rubygems/rubygems/commit/56c0bbb69e4506bda7ef7f447dfec5db820df20b

Backport of https://github.com/rubygems/rubygems/commit/56c0bbb69e4506bda7ef7f447dfec5db820df20b
addressing, thanks to Leonidas S. Barbosa

CVE-2019-8320
CVE-2019-8321
CVE-2019-8322
CVE-2019-8323
CVE-2019-8324
CVE-2019-8325

Gbp-Pq: Name CVE-2019-8320-25.patch

5 years agodebian-changes
Antonio Terceiro [Thu, 1 Oct 2020 13:24:55 +0000 (14:24 +0100)]
debian-changes

This patch file represents the entire difference between the package as shipped
by Debian and the official upstream sources. The goal is to maintain this file
as small as possible, avoiding non-upstreamed patches at all costs.

The Debian packaging is maintained in the following Git repository:

  http://anonscm.debian.org/gitweb/?p=collab-maint/ruby.git

To obtain a view of the individual commits that affect non-Debian-specific
files, you can clone that repository, and from the master branch, run:

  $ ./debian/upstream-changes

Gbp-Pq: Name debian-changes

5 years agoruby2.3 (2.3.3-1+deb9u9) stretch-security; urgency=high
Utkarsh Gupta [Thu, 1 Oct 2020 13:24:55 +0000 (14:24 +0100)]
ruby2.3 (2.3.3-1+deb9u9) stretch-security; urgency=high

  * Non-maintainer upload by the LTS team.
  * Add patch to fix a potential HTTP request smuggling
    vulnerability in WEBrick. (Fixes: CVE-2020-25613)

[dgit import unpatched ruby2.3 2.3.3-1+deb9u9]

5 years agoImport ruby2.3_2.3.3-1+deb9u9.debian.tar.xz
Utkarsh Gupta [Thu, 1 Oct 2020 13:24:55 +0000 (14:24 +0100)]
Import ruby2.3_2.3.3-1+deb9u9.debian.tar.xz

[dgit import tarball ruby2.3 2.3.3-1+deb9u9 ruby2.3_2.3.3-1+deb9u9.debian.tar.xz]

9 years agoImport ruby2.3_2.3.3.orig.tar.xz
Christian Hofstaedtler [Tue, 22 Nov 2016 12:32:41 +0000 (12:32 +0000)]
Import ruby2.3_2.3.3.orig.tar.xz

[dgit import orig ruby2.3_2.3.3.orig.tar.xz]