Revisions of ruby.SLE_11
Marcus Rueckert (darix)
committed
(revision 3)
- quote the $@ parameter in the wrapper scripts, it broke gem_install arguments.
Marcus Rueckert (darix)
committed
(revision 2)
- also require rubygems so we have the same base as newer ruby versions.
Marcus Rueckert (darix)
committed
(revision 1)
- also make the ghost files match what we generate in the rubygem based packages - also provide the %{_bindir}/$bin%{rb_binary_suffix} symlinks via u-a to be consistent with what gem based packages do. - merged ruby1.8-support directly into our ruby package - make it easier to support the new packaging scheme - CVE-2013-1821: ruby: entity expansion DoS vulnerability in REXML (bnc#808137) - added patches: * CVE-2013-1821.patch - fix CVE-2013-4164: heap overflow in float point parsing (bnc#851803) The file CVE-2013-4164.patch contains the patch - fix all licenses: In latest commit I just fixed the main package - fix license: ruby - fix CVE-2013-4073: Hostname check bypassing vulnerability in SSL client (bnc#827265) CVE-2013-4073.patch contains the fix based on https://github.com/ruby/ruby/commit/961bf7496ded3acfe847cf56fa90bbdcfd6e614f - added ruby-1.8.7_safe_level_bypass.patch: (bnc#783525) Fixes a SAFE_LEVEL bypass in name_err_to_s. CVE-2012-4466
Displaying all 3 revisions