./lang/ruby23-base, Ruby 2.3.7 release minimum base package

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]


Branch: CURRENT, Version: 2.3.7, Package name: ruby23-base-2.3.7, Maintainer: taca

Ruby is the interpreted scripting language for quick and
easy object-oriented programming. It has many features to
process text files and to do system management tasks (as in
Perl). It is simple, straight-forward, and extensible.

Features of Ruby are shown below.

+ Simple Syntax
+ *Normal* Object-Oriented features (ex. class, method calls)
+ *Advanced* Object-Oriented features (ex. Mix-in, Singleton-method)
+ Operator Overloading
+ Exception Handling
+ Iterators and Closures
+ Garbage Collection
+ Dynamic Loading of Object files (on some architecture)
+ Highly Portable (works on many UNIX machines, and on DOS,
Windows, Mac, BeOS etc.)

This package is Ruby 2.3 release minimum base package.

DEINSTALL [+/-]

Required to run:
[textproc/libyaml]

Required to build:
[pkgtools/cwrappers]

Package options: ruby-build-ri-db

Master sites: (Expand)

SHA1: 3bb88965405da5e4de2432eeb445fffa8a66fb33
RMD160: cb8f83f773a0d1cfc8595148ac61aff253f6b67d
Filesize: 14083.181 KB

Version history: (Expand)


CVS history: (Expand)


   2018-07-17 12:56:24 by Jonathan Perkin | Files touched by this commit (8)
Log message:
*: Add some required USE_GCC_RUNTIME.
   2018-03-29 05:09:35 by Takahiro Kambe | Files touched by this commit (7) | Package removed
Log message:
lang/ruby23-base: update to 2.3.7, security release

Ruby 2.3.7 Released				Posted by usa on 28 Mar 2018

Ruby 2.3.7 has been released.

This release includes about 70 bug fixes after the previous release, and also
includes several security fixes.  Please check the topics below for details.

* CVE-2017-17742: HTTP response splitting in WEBrick
* CVE-2018-8777: DoS by large request in WEBrick
* CVE-2018-6914: Unintentional file and directory creation with directory
  traversal in tempfile and tmpdir
* CVE-2018-8778: Buffer under-read in String#unpack
* CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in
  UNIXServer and UNIXSocket
* CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir
* Multiple vulnerabilities in RubyGems

See the ChangeLog for details.

After this release, we will end the normal maintenance phase of Ruby 2.3, and
start the security maintenance phase of it.  This means that after the release
of 2.3.7 we will never backport any bug fixes to 2.3 except security fixes.
The term of the security maintenance phase is scheduled for 1 year.  By the
end of this term, official support of Ruby 2.3 will be over.  Therefore, we
recommend that you start planning to upgrade to Ruby 2.5 or 2.4.
   2018-02-23 16:26:15 by Thomas Klausner | Files touched by this commit (4)
Log message:
lang/*: remove BROKEN markers for known openssl-1.1 breakage

Requested by joerg.
   2018-02-20 07:43:32 by Thomas Klausner | Files touched by this commit (1)
Log message:
ruby23: mark as broken on NetBSD-current due to openssl-1.1
   2018-02-19 17:46:26 by Takahiro Kambe | Files touched by this commit (2) | Package updated
Log message:
lang/ruby23-base: rubygem security fix

Add an patch to fix security problem of rubygems.

Bump PKGREVISION.
   2018-01-26 12:53:09 by Jonathan Perkin | Files touched by this commit (2)
Log message:
ruby23-base: Change previous to set CFLAGS instead, ride revbump.
   2018-01-26 11:54:15 by Jonathan Perkin | Files touched by this commit (3) | Package updated
Log message:
ruby23-base: Don't add -std=iso9899:1999 to CPPFLAGS, invalid for C++.

Bump PKGREVISION.
   2018-01-16 15:53:28 by Jonathan Perkin | Files touched by this commit (8)
Log message:
ruby*-base: Don't add SSP flags, leave that to pkgsrc.