summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Yusuke Endoh [Tue, 29 Sep 2020 04:15:58 +0000 (13:15 +0900)]
[PATCH] Make it more strict to interpret some headers
Some regexps were too tolerant.
Gbp-Pq: Name CVE-2020-25613.patch
usa [Mon, 30 Mar 2020 22:22:10 +0000 (22:22 +0000)]
[PATCH] merge revision(s)
36e9ed7fef6eb2d14becf6c52452e4ab16e4bf01: [Backport #16698]
backport
80b5a0ff2a7709367178f29d4ebe1c54122b1c27 partially as a
securify fix for CVE-2020-10663. The patch was provided by Jeremy Evans.
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/branches/ruby_2_6@67856
b2dd03c8-39d4-4d8f-98ff-
823fe69b080e
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/branches/ruby_2_5@67869
b2dd03c8-39d4-4d8f-98ff-
823fe69b080e
Author: Utkarsh Gupta <utkarsh@debian.org>
Gbp-Pq: Name CVE-2020-10663.patch
usa [Tue, 1 Oct 2019 11:01:53 +0000 (11:01 +0000)]
lib/shell/command-processor.rb (Shell#[]): prevent unknown command
Origin: https://github.com/ruby/ruby/commit/
3af01ae1101e0b8815ae5a106be64b0e82a58640
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2019-16255
`FileTest.send(command, ...)` allows to call not only FileTest-related
methods but also any method that belongs to Kernel, Object, etc.
patched by <mame@ruby-lang.org>
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/branches/ruby_2_5@67814
b2dd03c8-39d4-4d8f-98ff-
823fe69b080e
[Salvatore Bonaccorso: Backport to 2.3.3:
- Context changes in test/shell/test_command_processor.rb
]
Gbp-Pq: Name lib-shell-command-processor.rb-Shell-prevent-unknown.patch
Yusuke Endoh [Tue, 1 Oct 2019 03:29:18 +0000 (12:29 +0900)]
WEBrick: prevent response splitting and header injection
Origin: https://github.com/ruby/ruby/commit/
3ce238b5f9795581eb84114dcfbdf4aa086bfecc
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2019-16254
This is a follow up to
d9d4a28f1cdd05a0e8dabb36d747d40bbcc30f16.
The commit prevented CRLR, but did not address an isolated CR or an
isolated LF.
Co-Authored-By: NARUSE, Yui <naruse@airemix.jp>
[Salvatore Bonaccorso: Backport to 2.3.3:
- Context changes in test/webrick/test_httpresponse.rb
]
Gbp-Pq: Name WEBrick-prevent-response-splitting-and-header-inject.patch
Nobuyoshi Nakada [Tue, 13 Aug 2019 03:14:28 +0000 (12:14 +0900)]
Loop with String#scan without creating substrings
Origin: https://github.com/ruby/ruby/commit/
36e057e26ef2104bc2349799d6c52d22bb1c7d03
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2019-16201
Create the substrings necessary parts only, instead of cutting the
rest of the buffer. Also removed a useless, probable typo, regexp.
Gbp-Pq: Name Loop-with-String-scan-without-creating-substrings.patch
Nobuyoshi Nakada [Wed, 12 Dec 2018 05:38:09 +0000 (14:38 +0900)]
Fix for wrong fnmatch patttern
Origin: https://github.com/ruby/ruby/commit/
a0a2640b398cffd351f87d3f6243103add66575b
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2019-15845
* dir.c (file_s_fnmatch): ensure that pattern does not contain a
NUL character. https://hackerone.com/reports/449617
Gbp-Pq: Name Fix-for-wrong-fnmatch-patttern.patch
Antonio Terceiro [Thu, 1 Oct 2020 13:24:55 +0000 (14:24 +0100)]
CVE-2019-8320-25
Backport of https://github.com/rubygems/rubygems/commit/
56c0bbb69e4506bda7ef7f447dfec5db820df20b
Backport of https://github.com/rubygems/rubygems/commit/
56c0bbb69e4506bda7ef7f447dfec5db820df20b
addressing, thanks to Leonidas S. Barbosa
CVE-2019-8320
CVE-2019-8321
CVE-2019-8322
CVE-2019-8323
CVE-2019-8324
CVE-2019-8325
Gbp-Pq: Name CVE-2019-8320-25.patch
Antonio Terceiro [Thu, 1 Oct 2020 13:24:55 +0000 (14:24 +0100)]
debian-changes
This patch file represents the entire difference between the package as shipped
by Debian and the official upstream sources. The goal is to maintain this file
as small as possible, avoiding non-upstreamed patches at all costs.
The Debian packaging is maintained in the following Git repository:
http://anonscm.debian.org/gitweb/?p=collab-maint/ruby.git
To obtain a view of the individual commits that affect non-Debian-specific
files, you can clone that repository, and from the master branch, run:
$ ./debian/upstream-changes
Gbp-Pq: Name debian-changes
Utkarsh Gupta [Thu, 1 Oct 2020 13:24:55 +0000 (14:24 +0100)]
ruby2.3 (2.3.3-1+deb9u9) stretch-security; urgency=high
* Non-maintainer upload by the LTS team.
* Add patch to fix a potential HTTP request smuggling
vulnerability in WEBrick. (Fixes: CVE-2020-25613)
[dgit import unpatched ruby2.3 2.3.3-1+deb9u9]
Utkarsh Gupta [Thu, 1 Oct 2020 13:24:55 +0000 (14:24 +0100)]
Import ruby2.3_2.3.3-1+deb9u9.debian.tar.xz
[dgit import tarball ruby2.3 2.3.3-1+deb9u9 ruby2.3_2.3.3-1+deb9u9.debian.tar.xz]
Christian Hofstaedtler [Tue, 22 Nov 2016 12:32:41 +0000 (12:32 +0000)]
Import ruby2.3_2.3.3.orig.tar.xz
[dgit import orig ruby2.3_2.3.3.orig.tar.xz]