Commit graph

27 commits

Author SHA1 Message Date
taca
1cfef013e8 lang/ruby: switch to use distfiles in '.xz' format
Switch to use distfiles in '.xz' format.
2019-01-03 05:19:03 +00:00
taca
14de024045 lang/ruby23-base: update o 2.3.8
Ruby 2.3.8 Released

Ruby 2.3.8 has been released. This release includes several security
fixes. Please check the topics below for details.

* CVE-2018-16396: Tainted flags are not propagated in Array#pack and
  String#unpack with some directives

* CVE-2018-16395: OpenSSL::X509::Name equality check does not work
  correctly This release also includes a non-security fix to support
  Visual Studio 2014 with Windows 10 October 2018 Update for
  maintenance reasons.

Ruby 2.3 is now under the state of the security maintenance phase,
until the end of the March of 2019. After the date, maintenance of
Ruby 2.3 will be ended. We recommend you start planning migration to
newer versions of Ruby, such as 2.5 or 2.4.
2018-10-18 14:24:07 +00:00
jperkin
a2ce85611a *: Add some required USE_GCC_RUNTIME. 2018-07-17 10:56:23 +00:00
taca
526bcdc2f7 lang/ruby23-base: update to 2.3.7, security release
Ruby 2.3.7 Released				Posted by usa on 28 Mar 2018

Ruby 2.3.7 has been released.

This release includes about 70 bug fixes after the previous release, and also
includes several security fixes.  Please check the topics below for details.

* CVE-2017-17742: HTTP response splitting in WEBrick
* CVE-2018-8777: DoS by large request in WEBrick
* CVE-2018-6914: Unintentional file and directory creation with directory
  traversal in tempfile and tmpdir
* CVE-2018-8778: Buffer under-read in String#unpack
* CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in
  UNIXServer and UNIXSocket
* CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir
* Multiple vulnerabilities in RubyGems

See the ChangeLog for details.

After this release, we will end the normal maintenance phase of Ruby 2.3, and
start the security maintenance phase of it.  This means that after the release
of 2.3.7 we will never backport any bug fixes to 2.3 except security fixes.
The term of the security maintenance phase is scheduled for 1 year.  By the
end of this term, official support of Ruby 2.3 will be over.  Therefore, we
recommend that you start planning to upgrade to Ruby 2.5 or 2.4.
2018-03-29 03:09:35 +00:00
wiz
f0711fb72d lang/*: remove BROKEN markers for known openssl-1.1 breakage
Requested by joerg.
2018-02-23 15:26:14 +00:00
wiz
8e26913586 ruby23: mark as broken on NetBSD-current due to openssl-1.1 2018-02-20 06:43:32 +00:00
taca
9cc413ac3a lang/ruby23-base: rubygem security fix
Add an patch to fix security problem of rubygems.

Bump PKGREVISION.
2018-02-19 16:46:26 +00:00
jperkin
6128d92554 ruby23-base: Change previous to set CFLAGS instead, ride revbump. 2018-01-26 11:53:09 +00:00
jperkin
52f50d9542 ruby23-base: Don't add -std=iso9899:1999 to CPPFLAGS, invalid for C++.
Bump PKGREVISION.
2018-01-26 10:54:15 +00:00
jperkin
c2dbe3602e ruby*-base: Don't add SSP flags, leave that to pkgsrc. 2018-01-16 14:53:27 +00:00
taca
2654910bab lang/ruby23-base: Update to 2.3.6
Update ruby23-base/ruby23 to 2.3.6.

Ruby 2.3.6 has been released.

This release includes  about 10 bug fixes after  the previous release,
and  also includes  several security  fixes. Please  check the  topics
below for details.

* CVE-2017-17405: Command injection vulnerability in Net::FTP
* Unsafe Object Deserialization Vulnerability in RubyGems

See the ChangeLog for details.
2017-12-15 03:19:29 +00:00
taca
3ccc31b6e5 Update ruby23-base, ruby-gdbm, ruby-fiddle, ruby-readline, ruby-tk and
ruby23 packages to 2.3.5.

pkgsrc change: clean up PLIST.


Ruby 2.3.5 Released				Posted by usa on 14 Sep 2017

Ruby 2.3.5 has been released.

This release includes about 70 bug fixes after the previous release, and also
includes several security fixes. Please check the topics below for details.

* CVE-2017-0898: Buffer underrun vulnerability in Kernel.sprintf

* CVE-2017-10784: Escape sequence injection vulnerability in the Basic
  authentication of WEBrick

* CVE-2017-14033: Buffer underrun vulnerability in OpenSSL ASN1 docode

* CVE-2017-14064: Heap exposure vulnerability in generating JSON

* Multiple vulnerabilities in RubyGems

* Updated bundled libyaml to version 0.1.7

See the ChangeLog for details.
2017-09-15 00:36:17 +00:00
taca
331f22d2fa Add patch to fix vulnerabilities of rubygems.
https://www.ruby-lang.org/en/news/2017/08/29/multiple-vulnerabilities-in-rubygems/

* a DNS request hijacking vulnerability
* an ANSI escape sequence vulnerability
* a DoS vulernerability in the query command
* a vulnerability in the gem installer that allowed a malicious gem to
  overwrite arbitrary files

Bump PKGREVISION.
2017-08-30 03:32:55 +00:00
taca
5ce030c84c Fix build problem when set PKGSRC_USE_STACK_CHECK to "yes", which reported
by wiz@ via private mail.

The problem exists basic use of auto variable.
2017-07-24 13:38:42 +00:00
taca
158f45b075 Fix build problem when PKGSRC_USE_RELRO is not "no".
* Pass LDFLAGS to LIBRUBY_DLDFLAGS via DLDFLAGS as Ruby 2.4 dose.
2017-07-06 16:35:05 +00:00
taca
370c87b2d4 Replace RUBY_VERSION_FULL with RUBY_VERSION since there is no
RUBY_VERSION_FULL contains Ruby's patchlevel.
2017-05-30 15:46:21 +00:00
taca
e3e17d6f20 Update ruby23-base and related packages to 2.3.4.
Ruby 2.3.4 Released				2017/3/30

Ruby 2.3.4 has been released.

This release contains about 80 bug fixes after the previous release. See the
commit logs for details.

And this release contains a bug fix of Symbol#hash to be non-deterministic.
This is a regression on the 2.3 series before 2.3.4.  See Bug #13376 for more
details.
2017-04-09 15:57:00 +00:00
taca
d5e7de6e64 Update ruby23{,-base} to 2.3.3.
pkgsrc change: rubygems dose not blame open-ended dependency unless verbose
option is enabled.


Ruby 2.3.2 Released			Posted by nagachika on 15 Nov 2016

Ruby 2.3.2 has been released.

This is the TEENY version release of the stable 2.3 series.

This release contains update of RubyGems 2.5.2 and update of included ssl
certificates.


Ruby 2.3.3 Released			Posted by nagachika on 21 Nov 2016

Ruby 2.3.3 has been released.

This release contains a bug fix about Refinements and Module#prepend. The
mixture use of Module#refine and Module#prepend to the same Class could cause
unexpected NoMethodError. This is a regression on Ruby 2.3.2 released last
week. See [Bug #12920] for details.

There are some bugfixes too. See the ChangeLog for details.
2016-12-05 15:11:10 +00:00
taca
eb7780b911 Trying to move common configuration to common place. 2016-11-13 15:14:19 +00:00
joerg
852712577b Rename RUBY_VERSION_SUPPORTED into _RUBY_VERSIONS_ACCEPTED to follow the
naming scheme of the other multi-version packages. Add support for the
coorresponding RUBY_VERSIONS_INCOMPATIBLE list.
2016-09-08 15:19:16 +00:00
rillig
fb49e963e0 Removed reference to undefined RUBY_LICENSE variable. 2016-07-10 18:42:50 +00:00
taca
8ccbcf2535 Update ruby23 and ruby23-base to 2.3.1.
Ruby 2.3.1 Released			Posted by nagachika on 26 Apr 2016

Ruby 2.3.1 has been released.

This is the first TEENY version release of the stable 2.3 series.

There are many bugfixes. See the ChangeLog for details.
2016-05-15 14:19:56 +00:00
taca
f24151ae79 Try to fix build error by recent OpenSSL change on NetBSD,
reported as PR pkg/50971.
2016-03-24 16:28:59 +00:00
wiz
4e10979eaa Add upstream patch from SVN to fix build with RELRO.
I don't see a relation to relro, but the linker found out about
a missing symbol it didn't complain about before.

SVN 54139:

Thu Mar 17 11:36:27 2016  Nobuyoshi Nakada  <nobu@ruby-lang.org>

       * ext/socket/option.c (inspect_tcpi_msec): more accurate condition
         for TCPI msec member inspection function.
         [ruby-core:74388] [Bug #12185]

Bump PKGREVISION.
2016-03-17 07:55:43 +00:00
jperkin
17661ff9a5 Bump PKGREVISION for security/openssl ABI bump. 2016-03-05 11:27:40 +00:00
jperkin
db1332a441 Use OPSYSVARS. 2016-02-25 14:42:55 +00:00
taca
b22a24a715 Add ruby23-base package, core part of Ruby 2.3.0 pacakge.
From release announce:

Ruby 2.3.0 Released

Posted by naruse on 25 Dec 2015

We are pleased to announce the release of Ruby 2.3.0.

This is the first stable release of Ruby 2.3 series. It introduces many new
features for example:

A Frozen String Literal Pragma is introduced. With Ruby 2.1, "str".freeze has
been optimized to reduce object allocation. Ruby 2.3 introduces a new magic
comment and command line option to freeze all string literals in the source
files. Additionally for debugging, you can get where the object is created on
"can't modify frozen String" error by --debug=frozen-string-literal command
line option.

A safe navigation operator (so-called lonely operator) &., which already
exists in C#, Groovy, and Swift, is introduced to ease nil handling as
obj&.foo. Array#dig and Hash#dig are also added. Note that this behaves as
try! of Active Support, which specially handle only nil.

The did_you_mean gem is bundled. The did_you_mean gem shows the candidates on
the NameError and NoMethodError to ease debugging.

RubyVM::InstructionSequence#to_binary and .load_from_binary are introduced as
experimental feature. With these features, we can make a ISeq (bytecode)
pre-compilation system.

It also includes many performance improvements for example, reconsider method
entry data structure, introducing new table data structure, optimize
Proc#call, machine code level tuning for object allocation and method calling
code, smarter instance variable data structure, Socket and I/O allow to use
“exception:” keywords for high-performance non-blocking I/O and so on. Check
“Implementation improvements” section in NEWS file.

For a complete list of new features and compatibility notes, please see NEWS
and ChangeLog.
2015-12-30 14:59:42 +00:00