Revisions of ruby.SLE_11

Marcus Rueckert's avatar Marcus Rueckert (darix) committed (revision 3)
- quote the $@ parameter in the wrapper scripts, it broke
  gem_install arguments.
Marcus Rueckert's avatar Marcus Rueckert (darix) committed (revision 2)
- also require rubygems so we have the same base as newer ruby
  versions.
Marcus Rueckert's avatar Marcus Rueckert (darix) committed (revision 1)
- also make the ghost files match what we generate in the rubygem
  based packages

- also provide the %{_bindir}/$bin%{rb_binary_suffix} symlinks via
  u-a to be consistent with what gem based packages do.

- merged ruby1.8-support directly into our ruby package

- make it easier to support the new packaging scheme

- CVE-2013-1821: ruby: entity expansion DoS vulnerability in REXML
  (bnc#808137) 
- added patches:
  * CVE-2013-1821.patch

- fix CVE-2013-4164:  heap overflow in float point parsing (bnc#851803)
  The file CVE-2013-4164.patch contains the patch 

- fix all licenses: In latest commit I just fixed the main package

- fix license: ruby 

- fix CVE-2013-4073: Hostname check bypassing vulnerability in SSL 
  client (bnc#827265)
  CVE-2013-4073.patch contains the fix based on
  https://github.com/ruby/ruby/commit/961bf7496ded3acfe847cf56fa90bbdcfd6e614f  

- added ruby-1.8.7_safe_level_bypass.patch: (bnc#783525)
  Fixes a SAFE_LEVEL bypass in name_err_to_s. CVE-2012-4466
Displaying all 3 revisions
openSUSE Build Service is sponsored by