summaryrefslogtreecommitdiff
path: root/lang/ruby/rubyversion.mk
AgeCommit message (Collapse)AuthorFilesLines
2021-07-12Pullup ticket #6485 - requested by tacabsiegert1-4/+6
lang/ruby30-base: security fix Revisions pulled up: - lang/ruby/rubyversion.mk 1.234-1.235 - lang/ruby30-base/PLIST 1.3 - lang/ruby30-base/distinfo 1.3 --- Module Name: pkgsrc Committed By: taca Date: Wed Jul 7 16:10:01 UTC 2021 Modified Files: pkgsrc/lang/ruby: rubyversion.mk pkgsrc/lang/ruby30-base: PLIST distinfo Log Message: lang/ruby30-base: update to 3.0.2 Ruby 3.0.2 has been released. This release includes security fixes. Please check the topics below for details. * CVE-2021-31810: Trusting FTP PASV responses vulnerability in Net::FTP * CVE-2021-32066: A StartTLS stripping vulnerability in Net::IMAP * CVE-2021-31799: A command injection vulnerability in RDoc See the commit logs for details: <https://github.com/ruby/ruby/compare/v3_0_1...v3_0_2>. --- Module Name: pkgsrc Committed By: taca Date: Wed Jul 7 16:11:57 UTC 2021 Modified Files: pkgsrc/lang/ruby: rubyversion.mk Log Message: lang/ruby: make sure to update ruby30's version
2021-07-12Pullup ticket #6484 - requested by tacabsiegert1-3/+3
lang/ruby27-base: security fix Revisions pulled up: - lang/ruby/rubyversion.mk 1.233 - lang/ruby27-base/distinfo 1.5 --- Module Name: pkgsrc Committed By: taca Date: Wed Jul 7 15:23:08 UTC 2021 Modified Files: pkgsrc/lang/ruby: rubyversion.mk pkgsrc/lang/ruby27-base: distinfo Log Message: lang/ruby27-base: update to 2.7.4 Ruby 2.7.4 has been released. This release includes security fixes. Please check the topics below for details. * CVE-2021-31810: Trusting FTP PASV responses vulnerability in Net::FTP * CVE-2021-32066: A StartTLS stripping vulnerability in Net::IMAP * CVE-2021-31799: A command injection vulnerability in RDoc See the commit logs for details: <https://github.com/ruby/ruby/compare/v2_7_3...v2_7_4>.
2021-07-12Pullup ticket #6483 - requested by tacabsiegert1-3/+3
lang/ruby26: security fix Revisions pulled up: - lang/ruby/rubyversion.mk 1.232 - lang/ruby26-base/distinfo 1.11 --- Module Name: pkgsrc Committed By: taca Date: Wed Jul 7 15:15:19 UTC 2021 Modified Files: pkgsrc/lang/ruby: rubyversion.mk pkgsrc/lang/ruby26-base: distinfo Log Message: lang/ruby26-base: update to 2.6.8 Ruby 2.6.8 has been released. This release includes security fixes. Please check the topics below for details. * CVE-2021-31810: Trusting FTP PASV responses vulnerability in Net::FTP * CVE-2021-32066: A StartTLS stripping vulnerability in Net::IMAP * CVE-2021-31799: A command injection vulnerability in RDoc We ordinally do not fix Ruby 2.6 except security fixes, but this release also includes some regressed bugs and build problem fixes. See the commit logs for details. Ruby 2.6 is now under the state of the security maintenance phase, until the end of March of 2022. After that date, maintenance of Ruby 2.6 will be ended. We recommend you start planning the migration to newer versions of Ruby, such as 3.0 or 2.7.
2021-04-12lang/ruby/rubyversion.mk: require quotetaca1-2/+2
Require proper quote for previous addition to MAKEFLAGS.
2021-04-11lang/ruby30-base: update to 3.0.1taca1-8/+8
Ruby 3.0.1 Released (2021-04-05) Ruby 3.0.1 has been released. This release includes security fixes. Please check the topics below for details. * CVE-2021-28965: XML round-trip vulnerability in REXML * CVE-2021-28966: Path traversal in Tempfile on Windows See the commit logs for details.
2021-04-11lang/ruby27-base: update to 2.7.3taca1-4/+4
Ruby 2.7.3 Released (2021-04-05) This release includes security fixes. Please check the topics below for details. * CVE-2021-28965: XML round-trip vulnerability in REXML * CVE-2021-28966: Path traversal in Tempfile on Windows See the commit logs for details.
2021-04-11lang/ruby26-base: update to 2.6.7taca1-4/+4
Ruby 2.6.7 Released (2021-04-05) This release includes security fixes. Please check the topics below for details. * CVE-2020-25613: Potential HTTP Request Smuggling Vulnerability in WEBrick * CVE-2021-28965: XML round-trip vulnerability in REXML See the commit logs for details. By this release, we end the normal maintenance phase of Ruby 2.6, and Ruby 2.6 enters the security maintenance phase. This means that we will no longer backport any bug fixes to Ruby 2.6 except security fixes. The term of the security maintenance phase is scheduled for a year. Ruby 2.6 reaches EOL and its official support ends by the end of the security maintenance phase. Therefore, we recommend that you start to plan upgrade to Ruby 2.7 or 3.0.
2021-04-11lang/ruby/rubyversion.mk: pass RUBY_RAILS_ACCEPTEDtaca1-1/+4
Pass RUBY_RAILS_ACCEPTED to MAKEFLAGS unless it isn't empty.
2021-04-01lang/ruby: remove Ruby 2.5 supporttaca1-38/+12
2021-03-21lang/ruby: PRINT_PLIST_AWK improvementtaca1-1/+6
* Move PRINT_PLIST_AWK for ${RUBY_SUFFIX} from gem.mk to rubyversion.mk. It was previously committed in gem.mk. * Add support ${RUBY_SUFFIX} to online manual.
2021-02-14lang/ruby: add support for Ruby 3.0taca1-9/+71
2020-10-04lang/ruby: update version for Ruby 2.7.2taca1-3/+3
Update versions for Ruby 2.7.2, it should be commited along with update to Ruby 2.7.2. Noted by Ryo ONODERA.
2020-05-21lang/ruby: drop support of Ruby 2.4taca1-35/+12
Drop support of ruby24 (Ruby 2.4).
2020-04-01lang/ruby24-base: update to 2.4.10taca1-3/+3
Update ruby24-base (and ruby24) to 2.4.10. This release includes a security fix. Please check the topics below for details. * CVE-2020-16255: Unsafe Object Creation Vulnerability in JSON (Additional fix) Ruby 2.4 is now under the state of the security maintenance phase, until the end of March of 2020. After that date, maintenance of Ruby 2.4 will be ended. Thus, this release would be the last of Ruby 2.4 series. We recommend you immediately upgrade Ruby to newer versions, such as 2.7 or 2.6 or 2.5.
2020-04-01lang/ruby25-base: update to 2.5.8taca1-2/+2
Update ruby25-base (and ruby25) to 2.5.8. 2.5.8 (2020-03-31) This release includes security fixes. Please check the topics below for details. * CVE-2020-16255: Unsafe Object Creation Vulnerability in JSON (Additional fix) * CVE-2020-10933: Heap exposure vulnerability in the socket library
2020-04-01lang/ruby27-base: update to 2.7.1taca1-6/+6
Update ruby27-base (and ruby27) to 2.7.1. 2.7.1 (2020-03-31) This release includes security fixes. Please check the topics below for details. * CVE-2020-16255: Unsafe Object Creation Vulnerability in JSON (Additional fix) * CVE-2020-10933: Heap exposure vulnerability in the socket library
2020-04-01lang/ruby26-base: update to 2.6.6taca1-3/+3
Update ruby26-base (and ruby26 related packages) to 2.6.6. 2.6.6 (2020-03-31) This release includes security fixes. Please check the topics below for details. * CVE-2020-16255: Unsafe Object Creation Vulnerability in JSON (Additional fix) * CVE-2020-10933: Heap exposure vulnerability in the socket library
2020-03-15lang/ruby: drop support for Ruby 2.2taca1-33/+10
* Drop support for Ruby 2.2. * Update document in comment for Ruby 2.7.
2020-03-15lang/ruby: add support for Ruby 2.7taca1-3/+61
Add support for Ruby 2.7.
2020-03-08lang/ruby: document RUBY_VERSIONS_INCOMPATIBLEtaca1-1/+7
Add RUBY_VERSIONS_INCOMPATIBLE document in comment.
2019-12-15lang/ruby: change default Ruby to 2.6.xtaca1-3/+3
Change default vesion of Ruby from 2.4.x to 2.6.x. * Ruby 2.7 will be released within this year. * Ruby 2.6.x is stable enough and actively maintained. * Ryby 2.5.x will be in security maintenance phase after release of Ruby 2.7. * Ruby 2.4.x will be EOL after 31th March 2020.
2019-11-03lang: align variable assignmentsrillig1-35/+35
pkglint -Wall -F --only aligned --only indent -r No manual corrections.
2019-10-24lang/ruby: change for --no-document optiontaca1-12/+4
Replace RUBY_BUILD_RDOC and RUBY_BUILD_RI with RUBY_BUILD_DOCUMENT since rdoc's --no-rdoc and --no-ri options are deprecated almost 8 years ago and these options are replaced with -no-document option. No package should be changed.
2019-10-02lang/ruby26: update to 2.6.5taca1-2/+2
Update ruby26-base and ruby26 packges to 2.6.5 pkgsrc chagnes * fix warnings of pkglint. Quote from release announce: Ruby 2.6.5 (2019-10-01) This release includes security fixes. Please check the topics below for details. * CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test * CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix) * CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch? * CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick's Digest access authentication
2019-10-02lang/ruby25: update to 2.5.7taca1-2/+2
Update ruby25-base, ruby25 and ruby25-mode packges to 2.5.7. pkgsrc chagnes * fix warnings of pkglint. Quote from release announce: Ruby 2.5.7 (2019-10-01) This release includes security fixes as listed below. Please check the topics below for details. * CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test * CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix) * CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch? * CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick's Digest access authentication
2019-10-02lang/ruby24: update to 2.4.9taca1-2/+2
Update ruby24-base and related packges to 2.4.9. pkgsrc chagnes * fix warnings of pkglint. Quote from release announce: Ruby 2.4.8 (2019-10-01) This release includes security fixes. Please check the topics below for details. * CVE-2019-16255: A code injection vulnerability of Shell#[] and Shell#test * CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix) * CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and File.fnmatch? * CVE-2019-16201: Regular Expression Denial of Service vulnerability of WEBrick¡Çs Digest access authentication Ruby 2.4.9 (2019-10-02) This release is a re-package of 2.4.8 because the previous Ruby 2.4.8 release tarball does not install. (See [Bug #16197] in detail.) There are no essential change except their version numbers between 2.4.8 and 2.4.9. Ruby 2.4 is now under the state of the security maintenance phase, until the end of March of 2020. After that date, maintenance of Ruby 2.4 will be ended. We recommend you start planning the migration to newer versions of Ruby, such as 2.6 or 2.5.
2019-08-28lang/ruby26: update to 2.6.4taca1-3/+3
Update lang/ruby26-base and lang/ruby26 to 2.6.4. Ruby 2.6.4 (2019-08-28) Ruby 2.6.4 has been released. This release includes a security fix of rdoc. Please check the topics below for details. * Multiple jQuery vulnerabilities in RDoc See the commit logs for changes in detail.
2019-08-28lang/ruby25: update to 2.5.6taca1-3/+3
Update ruby25-base/ruby25 to 2.5.6. Ruby 2.5.6 (2019-08-28) Ruby 2.5.6 has been released. This release includes about 40 bug fixes after the previous release, and also includes a security fix. Please check the topics below for details. * Multiple jQuery vulnerabilities in RDoc See the commit log for details.
2019-08-28lang/ruby24-base: update to 2.4.7taca1-3/+3
2.4.7 (2019-08-28) Ruby 2.4.7 has been released. This release includes a security fix. Please check the topics below for details. * Multiple jQuery vulnerabilities in RDoc Ruby 2.4 is now under the state of the security maintenance phase, until the end of March of 2020. After that date, maintenance of Ruby 2.4 will be ended. We recommend you start planning the migration to newer versions of Ruby, such as 2.6 or 2.5.
2019-04-17lang/ruby26-base: update to 2.6.3taca1-3/+3
Update ruby26{,-base} to 2.6.3. Here is release announce: Ruby 2.6.3 Released Posted by naruse on 17 Apr 2019 Ruby 2.6.3 has been released. This release adds support for New Japanese Era “令和” (Reiwa). It updates the Unicode version to 12.1 beta (#15195), and updates date library (#15742). This release also includes some bug fixes. See details commit logs.
2019-04-14lang/ruby: remove support for ruby23taca1-32/+11
Remove support for ruby23.
2019-04-07lang/ruby24-base: update to 2.4.6taca1-2/+2
* vulnerabilities of rubygems are already fixed in 2.4.5nb1. Ruby 2.4.6 Released 1 Apr 2019 Ruby 2.4.6 has been released. This release includes about 20 bug fixes after the previous release, and also includes several security fixes. Please check the topics below for details. * Multiple vulnerabilities in RubyGems See the commit log for details. After this release, we will end the normal maintenance phase of Ruby 2.4, and start the security maintenance phase of it. This means that after the release of 2.4.6 we will never backport any bug fixes to 2.4 except security fixes. The term of the security maintenance phase is scheduled for 1 year. By the end of this term, official support of Ruby 2.4 will be over. Therefore, we recommend that you start planning to upgrade to Ruby 2.6 or 2.5.
2019-03-16lang/ruby26-base: update to 2.6.2taca1-2/+2
Update ruby26{,-base} to 2.6.2. Quote from release announce. Ruby 2.6.2 (2019-03-13) This release includes bug fixes and a security update of the bundled RubyGems. See details in Multiple vulnerabilities in RubyGems and the commit logs.
2019-03-16lang/ruby25-base: updateo to 2.5.5taca1-2/+2
Update ruby25{,-base} to 2.5.5. Quote from release announce: Ruby 2.5.4 (2019-03-13) This release includes bug fixes and a security update of the bundled RubyGems. See details in Multiple vulnerabilities in RubyGems and the commit logs. Ruby 2.5.5 (2019-03-15) This release includes a bug fix for the deadlock in the multi-thread+multi-process (using Process.fork) applications (ex: puma).
2019-02-03lang/ruby: add support for Ruby 2.6taca1-9/+91
* Add support for Ruby 2.6 with release 2.6.1.
2019-01-13lang/ruby: reduce support for ruby22taca1-3/+3
Remove "22" from RUBY_VERSIONS_ACCEPTED. Now Ruby 2.2 based package would be lang/ruby22, devel/ruby-redmine and related packages.
2018-10-18lang/ruby23-base: update o 2.3.8taca1-2/+2
Ruby 2.3.8 Released Ruby 2.3.8 has been released. This release includes several security fixes. Please check the topics below for details. * CVE-2018-16396: Tainted flags are not propagated in Array#pack and String#unpack with some directives * CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly This release also includes a non-security fix to support Visual Studio 2014 with Windows 10 October 2018 Update for maintenance reasons. Ruby 2.3 is now under the state of the security maintenance phase, until the end of the March of 2019. After the date, maintenance of Ruby 2.3 will be ended. We recommend you start planning migration to newer versions of Ruby, such as 2.5 or 2.4.
2018-10-18lang/ruby25-base: update to 2.5.3taca1-3/+3
Ruby 2.5.2 Released Ruby 2.5.2 has been released. This release includes some bug fixes and some security fixes. * CVE-2018-16396: Tainted flags are not propagated in Array#pack and String#unpack with some directives * CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly There are also some bug fixes. See commit logs for more details. Ruby 2.5.3 Released Ruby 2.5.3 has been released. There were some missing files in the release packages of 2.5.2 which are necessary for building. See details in [Bug #15232]. This release is just for fixing the packaging issue. This release doesn’t contain any additional bug fixes from 2.5.2.
2018-10-18lang/ruby24-base: update to 2.4.5taca1-3/+3
Ruby 2.4.5 Released Ruby 2.4.5 has been released. This release includes about 40 bug fixes after the previous release, and also includes several security fixes. Please check the topics below for details. * CVE-2018-16396: Tainted flags are not propagated in Array#pack and String#unpack with some directives * CVE-2018-16395: OpenSSL::X509::Name equality check does not work correctly See the commit logs for details.
2018-03-29lang/ruby22-base: update to 2.2.10, security releasetaca1-2/+2
Ruby 2.2.10 Released Posted by usa on 28 Mar 2018 Ruby 2.2.10 has been released. This release includes several security fixes. Please check the topics below for details. * CVE-2017-17742: HTTP response splitting in WEBrick * CVE-2018-8777: DoS by large request in WEBrick * CVE-2018-6914: Unintentional file and directory creation with directory traversal in tempfile and tmpdir * CVE-2018-8778: Buffer under-read in String#unpack * CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket * CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir * Multiple vulnerabilities in RubyGems Ruby 2.2 is under the state of the security maintenance phase, until the end of the March of 2018. After the date, maintenance of Ruby 2.2 will be ended. So, this release is expected to be the last release of Ruby 2.2. We will never make a new release of Ruby 2.2 unless Ruby 2.2.10 has a serious regression bug. We recommend you migrating to newer versions of Ruby, such as 2.5.
2018-03-29lang/ruby23-base: update to 2.3.7, security releasetaca1-2/+2
Ruby 2.3.7 Released Posted by usa on 28 Mar 2018 Ruby 2.3.7 has been released. This release includes about 70 bug fixes after the previous release, and also includes several security fixes. Please check the topics below for details. * CVE-2017-17742: HTTP response splitting in WEBrick * CVE-2018-8777: DoS by large request in WEBrick * CVE-2018-6914: Unintentional file and directory creation with directory traversal in tempfile and tmpdir * CVE-2018-8778: Buffer under-read in String#unpack * CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket * CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir * Multiple vulnerabilities in RubyGems See the ChangeLog for details. After this release, we will end the normal maintenance phase of Ruby 2.3, and start the security maintenance phase of it. This means that after the release of 2.3.7 we will never backport any bug fixes to 2.3 except security fixes. The term of the security maintenance phase is scheduled for 1 year. By the end of this term, official support of Ruby 2.3 will be over. Therefore, we recommend that you start planning to upgrade to Ruby 2.5 or 2.4.
2018-03-29lang/ruby25-base: update to 2.5.1, security releasetaca1-2/+2
Ruby 2.5.1 Released Posted by naruse on 28 Mar 2018 Ruby 2.5.1 has been released. This release includes some bug fixes and some security fixes. * CVE-2017-17742: HTTP response splitting in WEBrick * CVE-2018-6914: Unintentional file and directory creation with directory traversal in tempfile and tmpdir * CVE-2018-8777: DoS by large request in WEBrick * CVE-2018-8778: Buffer under-read in String#unpack * CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket * CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir * Multiple vulnerabilities in RubyGems There are also some bug fixes. See commit logs for more details.
2018-03-29lang/ruby24-base: update to 2.4.4, security releasetaca1-4/+4
Ruby 2.4.4 Released Posted by nagachika on 28 Mar 2018 Ruby 2.4.4 has been released. This release includes some bug fixes and some security fixes. * CVE-2017-17742: HTTP response splitting in WEBrick * CVE-2018-6914: Unintentional file and directory creation with directory traversal in tempfile and tmpdir * CVE-2018-8777: DoS by large request in WEBrick * CVE-2018-8778: Buffer under-read in String#unpack * CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket * CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir * Multiple vulnerabilities in RubyGems There are also some bug fixes. See commit logs for more details.
2018-02-25lang/ruby: switch default version of Ruby to 2.4taca1-7/+7
Switch default version of Ruby to 2.4 from 2.3. Ruby 2.4 supports OpenSSL 1.1.0 and most stable release currently.
2018-02-19lang/ruby: GC unused variable related to version of Rubygemstaca1-5/+1
Remove RUBY_GEMS_VERSION which is referenced by _RUBYGEMS_MAJOR and _RUBYGEMS_MINOR, unused variables.
2018-02-19Add RUBY_NAME to PLIST_SUBST to fix ruby-xapian.taca1-2/+2
2018-01-08lang/ruby: Add support for Ruby 2.5taca1-9/+34
2017-12-15lang/ruby22-base: update to 2.2.9taca1-3/+3
Ruby 2.2.9 Released Posted by usa on 14 Dec 2017 Ruby 2.2.9 has been released. This release includes several security fixes. Please check the topics below for details. * CVE-2017-17405: Command injection vulnerability in Net::FTP * Unsafe Object Deserialization Vulnerability in RubyGems Ruby 2.2 is now under the state of the security maintenance phase, until the end of the March of 2018. After the date, maintenance of Ruby 2.2 will be ended. We recommend you start planning migration to newer versions of Ruby, such as 2.4 or 2.3.
2017-12-15lang/ruby24-base: update to 2.4.3taca1-3/+3
Update ruby24-base/ruby24 to 2.4.3. Ruby 2.4.3 Released Posted by nagachika on 14 Dec 2017 Ruby 2.4.3 has been released. This release includes some bug fixes and a security fix. * CVE-2017-17405: Command injection vulnerability in Net::FTP There are also som bug fixes. See commit logs for more details.
2017-12-15lang/ruby23-base: Update to 2.3.6taca1-3/+3
Update ruby23-base/ruby23 to 2.3.6. Ruby 2.3.6 has been released. This release includes about 10 bug fixes after the previous release, and also includes several security fixes. Please check the topics below for details. * CVE-2017-17405: Command injection vulnerability in Net::FTP * Unsafe Object Deserialization Vulnerability in RubyGems See the ChangeLog for details.