Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: ruby | Distribution: CentOS |
Version: 3.0.7 | Vendor: CentOS |
Release: 162.el9 | Build date: Mon May 13 16:31:11 2024 |
Group: Unspecified | Build host: aarch64-01.stream.rdu2.redhat.com |
Size: 144899 | Source RPM: ruby-3.0.7-162.el9.src.rpm |
Packager: [email protected] | |
Url: https://www.ruby-lang.org/ | |
Summary: An interpreter of object-oriented scripting language |
Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible.
(Ruby or BSD) and Public Domain and MIT and CC0 and zlib and UCD
* Tue Apr 30 2024 Jun Aruga <[email protected]> - 3.0.7-162 - Upgrade to Ruby 3.0.7. Resolves: RHEL-35740 - Fix HTTP response splitting in CGI. Resolves: RHEL-35741 - Fix ReDoS vulnerability in URI. Resolves: RHEL-35742 - Fix ReDoS vulnerability in Time. Resolves: RHEL-35743 - Fix buffer overread vulnerability in StringIO. Resolves: RHEL-35744 - Fix RCE vulnerability with .rdoc_options in RDoc. Resolves: RHEL-35746 - Fix arbitrary memory address read vulnerability with Regex search. Resolves: RHEL-35747 * Mon Oct 09 2023 Jun Aruga <[email protected]> - 3.0.4-161 - Fix OpenSSL.fips_mode and OpenSSL::PKey.read in OpenSSL 3 FIPS. Resolves: RHEL-12724 - ssl: use ffdhe2048 from RFC 7919 as the default DH group parameters Related: RHEL-12724 * Wed Jun 28 2023 Jun Aruga <[email protected]> - 3.0.4-160 - Bypass git submodule test failure on Git >= 2.38.1. - Fix tests with Europe/Amsterdam pre-1970 time on tzdata version 2022b. - Fix for tzdata-2022g. - Fix File.utime test. * Fri Jul 08 2022 Jarek Prokop <[email protected]> - 3.0.4-160 - Upgrade to Ruby 3.0.4. Resolves: rhbz#2096347 - OpenSSL test suite fixes due to disabled SHA1. Resolves: rbhz#2107696 - Fix double free in Regexp compilation. Resolves: CVE-2022-28738 - Fix buffer overrun in String-to-Float conversion. Resolves: CVE-2022-28739
/usr/bin/erb /usr/bin/ruby /usr/lib/.build-id /usr/lib/.build-id/aa /usr/lib/.build-id/aa/41686e562c0c2a06abee25cde6d14eaa102069 /usr/share/licenses/ruby /usr/share/licenses/ruby/BSDL /usr/share/licenses/ruby/COPYING /usr/share/licenses/ruby/COPYING.ja /usr/share/licenses/ruby/GPL /usr/share/licenses/ruby/LEGAL /usr/share/man/man1/erb.1.gz /usr/share/man/man1/ruby.1.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Dec 10 09:59:37 2024