Back to ruby1.9.1 PTS page

Accepted ruby1.9.1 1.9.2.0-2+deb6u4 (source all i386) into squeeze-lts



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 30 May 2015 17:34:31 +0200
Source: ruby1.9.1
Binary: ruby1.9.1 libruby1.9.1 libruby1.9.1-dbg ruby1.9.1-dev libtcltk-ruby1.9.1 ruby1.9.1-examples ruby1.9.1-elisp ri1.9.1 ruby1.9.1-full
Architecture: source all i386
Version: 1.9.2.0-2+deb6u4
Distribution: squeeze-lts
Urgency: high
Maintainer: akira yamada <akira@debian.org>
Changed-By: Thorsten Alteholz <debian@alteholz.de>
Description: 
 libruby1.9.1 - Libraries necessary to run Ruby 1.9.1
 libruby1.9.1-dbg - Debugging symbols for Ruby 1.9.1
 libtcltk-ruby1.9.1 - Tcl/Tk interface for Ruby 1.9.1
 ri1.9.1    - Ruby Interactive reference (for Ruby 1.9.1)
 ruby1.9.1  - Interpreter of object-oriented scripting language Ruby 1.9.2
 ruby1.9.1-dev - Header files for compiling extension modules for the Ruby 1.9.1
 ruby1.9.1-elisp - ruby-mode for Emacsen
 ruby1.9.1-examples - Examples for Ruby 1.9
 ruby1.9.1-full - Ruby 1.9.1 full installation
Changes: 
 ruby1.9.1 (1.9.2.0-2+deb6u4) squeeze-lts; urgency=high
 .
   * Non-maintainer upload by the Squeeze LTS Team.
   * CVE-2011-0188: The VpMemAlloc function in bigdecimal.c in the BigDecimal
     class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before
     10.6.7 and other platforms, does not properly allocate memory, which allows
     context-dependent attackers to execute arbitrary code or cause a denial of
     service (application crash) via vectors involving creation of a large
     BigDecimal value within a 64-bit process, related to an "integer truncation
     issue."k
   * CVE-2011-2705: use upstream SVN r32050 to modify PRNG state to prevent
     random number sequence repeatation at forked child process which has same
     pid. Reported by Eric Wong.
   * CVE-2012-4522: The rb_get_path_check function in file.c in Ruby 1.9.3 before
     patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers
     to create files in unexpected locations or with unexpected names via a
     NUL byte in a file path.
   * CVE-2013-0256: darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before
     4.0.0.preview2.1, as used in Ruby, does not properly generate documents,
     which allows remote attackers to conduct cross-site scripting (XSS) attacks
     via a crafted URL.
   * CVE-2013-2065: (1) DL and (2) Fiddle in Ruby 1.9 before 1.9.3 patchlevel 426,
     and 2.0 before 2.0.0 patchlevel 195, do not perform taint checking for native
     functions, which allows context-dependent attackers to bypass intended $SAFE
     level restrictions.
   * CVE-2015-1855: OpenSSL extension hostname matching implementation
     violates RFC 6125
Checksums-Sha1: 
 fd4d86e5c6e0e999e2ffec68d8af627d1662c585 2345 ruby1.9.1_1.9.2.0-2+deb6u4.dsc
 150ceb191a8d355d7105de24eed84655ad767c8a 56282 ruby1.9.1_1.9.2.0-2+deb6u4.debian.tar.gz
 6288d3e15540e87ba9cc1bd030be0cc74f4ccb56 781510 ruby1.9.1-examples_1.9.2.0-2+deb6u4_all.deb
 d3a163a4a766a6ea6f2e271b2ff36e551a9554df 743942 ruby1.9.1-elisp_1.9.2.0-2+deb6u4_all.deb
 1498a62d4dc914f593a57381b3fbfca2dfd83edf 2089112 ri1.9.1_1.9.2.0-2+deb6u4_all.deb
 66f46eba3702042f16624d82ddbcedeca69b776f 719260 ruby1.9.1-full_1.9.2.0-2+deb6u4_all.deb
 40580ba6edffa45fb76cdbc088aee4cedc02d079 754730 ruby1.9.1_1.9.2.0-2+deb6u4_i386.deb
 c451fbd07b87205918043d18a03f6207b159623f 4488482 libruby1.9.1_1.9.2.0-2+deb6u4_i386.deb
 42327b6804fc3248fc1794948fda92eb29029d72 3908514 libruby1.9.1-dbg_1.9.2.0-2+deb6u4_i386.deb
 b109fd0057b3a6e81c153a1b446138754b957809 1795278 ruby1.9.1-dev_1.9.2.0-2+deb6u4_i386.deb
 1745840121a582448a70fb2f53fd2eeb76e27dab 2497964 libtcltk-ruby1.9.1_1.9.2.0-2+deb6u4_i386.deb
Checksums-Sha256: 
 0bb62519fb041b07e2bfae89789016e1e1b265c05b7b6d6b08b6d021dbba6212 2345 ruby1.9.1_1.9.2.0-2+deb6u4.dsc
 badb0005ca652bb3b3b7ed272f353883093cfe111bb52d5fd882e0311ecd3393 56282 ruby1.9.1_1.9.2.0-2+deb6u4.debian.tar.gz
 364e137f87b00ece053af06ec68264c4df1265ed685c346a68d152186a82f291 781510 ruby1.9.1-examples_1.9.2.0-2+deb6u4_all.deb
 de9b50fcb6012d834b033113e4553851bac7a9720da130ab89b1f11e033821d5 743942 ruby1.9.1-elisp_1.9.2.0-2+deb6u4_all.deb
 93053813e3ff409c49eeee95149f23b4137cfa417f6c1fb9ac35ef2dc84b2df3 2089112 ri1.9.1_1.9.2.0-2+deb6u4_all.deb
 5b510ca0444b60583f5d2243e6aff62afb9b24d0464cfb3e8625e9e372a0fbcd 719260 ruby1.9.1-full_1.9.2.0-2+deb6u4_all.deb
 556bb3001f70a26493141f0b8dba34564b9a89709265a165a64b333661059354 754730 ruby1.9.1_1.9.2.0-2+deb6u4_i386.deb
 f29e22878973baee0c0fe1afea3f73821b4d3b95c33f56d7841212fbf40f7fb6 4488482 libruby1.9.1_1.9.2.0-2+deb6u4_i386.deb
 3ab6b607aab4dbe56d73fbd279b0bc8764cecfe73b8a48aa8d30c97fa5fe43be 3908514 libruby1.9.1-dbg_1.9.2.0-2+deb6u4_i386.deb
 4b919790a79f3885e665a14128a07b4282024fd200623e9b8d3c4cca9d4b6196 1795278 ruby1.9.1-dev_1.9.2.0-2+deb6u4_i386.deb
 3c973f2cab5aef1b4190e7b936bf703c7459f969497d6f270fda9c511bb7b11a 2497964 libtcltk-ruby1.9.1_1.9.2.0-2+deb6u4_i386.deb
Files: 
 6c600ee0cd9362ec1cd6377789f6a780 2345 ruby optional ruby1.9.1_1.9.2.0-2+deb6u4.dsc
 5cdbf6ee6617a24ca5f04e0548cbee11 56282 ruby optional ruby1.9.1_1.9.2.0-2+deb6u4.debian.tar.gz
 1783e74b0eb89c3186b57920e15014bf 781510 ruby optional ruby1.9.1-examples_1.9.2.0-2+deb6u4_all.deb
 de33dd9c6f80c804b99a37c7086db661 743942 ruby optional ruby1.9.1-elisp_1.9.2.0-2+deb6u4_all.deb
 d7d3762dc8df33a39ccd69b877bdad5c 2089112 ruby optional ri1.9.1_1.9.2.0-2+deb6u4_all.deb
 9e3e59da7c76e94565ef5917e4d0c695 719260 ruby optional ruby1.9.1-full_1.9.2.0-2+deb6u4_all.deb
 d591212ea3a8eb5b3de7b1d91785d327 754730 ruby optional ruby1.9.1_1.9.2.0-2+deb6u4_i386.deb
 c56a29b32e4cb4d3c449d0cc5f195640 4488482 libs optional libruby1.9.1_1.9.2.0-2+deb6u4_i386.deb
 5e9f2060267ca32ae3ce1fc625a79acb 3908514 debug extra libruby1.9.1-dbg_1.9.2.0-2+deb6u4_i386.deb
 068e6354b04b1a3745a75e1265e84b64 1795278 ruby optional ruby1.9.1-dev_1.9.2.0-2+deb6u4_i386.deb
 cbce3bcce235de06cbffb6233bffdb7c 2497964 ruby optional libtcltk-ruby1.9.1_1.9.2.0-2+deb6u4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=rj5e
-----END PGP SIGNATURE-----