deepj
07190b062b
Upgrade to OpenSSL 1.0.2g
2016-03-03 10:39:23 +01:00
Mislav Marohnić
875ded8c69
Upgrade OpenSSL to 1.0.2f across the board
2016-01-30 18:16:28 +11:00
deepj
c9a3e265ef
Upgrade to OpenSSL 1.0.1r and 1.0.2f
2016-01-30 02:03:10 +01:00
deepj
e59482d9f8
Upgrade to OpenSSL 1.0.1q
2015-12-03 20:28:36 +01:00
deepj
d989a9b0bf
Upgrade OpenSSL to 1.0.1p
2015-07-09 15:41:39 +02:00
deepj
b7363f749b
Upgrade OpenSSL to 1.0.1o
2015-06-12 18:33:59 +02:00
deepj
e3f622ee50
Upgrade OpenSSL to 1.0.1n
2015-06-11 23:38:33 +02:00
deepj
54d0000e06
Upgrade openssl-1.0.1m
2015-03-19 21:10:52 +01:00
deepj
67a0338480
Upgrade openssl-1.0.1l
2015-01-16 08:48:44 +01:00
deepj
56b3989b1c
Upgrade openssl-1.0.1k
2015-01-08 22:28:11 +01:00
SHIBATA Hiroshi
5d738abbc9
upgrade openssl-1.0.1j
2014-10-16 09:48:04 +09:00
Holger Just
e90cb88c41
Upgrade OpenSSL library to 1.0.1i
...
Previous versions of the library contain several vulnerabilities:
https://www.openssl.org/news/secadv_20140806.txt
2014-09-24 14:23:06 +02:00
deg84
ee04b9d3c5
OpenSSL library updated to 1.0.1h
...
Previous versions of the library contain a vulnerability CVE-2014-0224.
2014-06-06 01:30:29 +09:00
Thomas Johansen
e9d59cb0cc
Replace all MD5 checksums with SHA2 checksums
2014-05-23 14:39:41 +07:00
Vadim Golub
7bb33b04af
OpenSSL library updated to 1.0.1g
...
Previous versions of the library contain a vulnerability CVE-2014-0160.
2014-04-08 01:51:57 +03:00
SHIBATA Hiroshi
436735420c
remove build of libyaml, because bundled libyaml is already updated
2014-02-24 13:02:19 +09:00
Andreas Fuchs
45067e752f
Install libyaml 0.1.5 for 2.x rubies also
...
This should plug the vulnerability to CVE-2013-6393 (and fix #504 )
that can still occur in certain systems: If the ruby build process
couldn't find a libyaml that worked, it would build its own vendored
libyaml, which was 0.1.4 (and is vulnerable).
Instead, specify that the build always should install the latest
libyaml & build against that.
2014-02-07 15:41:03 -08:00
SHIBATA Hiroshi
81bbb68de6
bump versions to 2.1.0
2013-02-25 13:04:17 +09:00
Mark Madsen
ea21ec4ee3
fixed typo when openssl-1.0.1e was added to ruby 2.0.0
2013-02-11 17:02:43 -07:00
Erik Michaels-Ober
ffef047307
Upgrade to OpenSSL 1.0.1e
2013-02-11 15:39:03 -08:00
Jeremy Kemper
a550dec3c5
Strip stray newline
2013-02-08 17:39:20 -07:00
Jeremy Kemper
b5baf47dae
Upgrade to OpenSSL 1.0.1d, released 2013-02-05
2013-02-08 17:36:08 -07:00
Sam Stephenson
243e6fbecf
Support conditional package installation with --if <test>
2013-02-08 16:48:02 -06:00
Sam Stephenson
a0ace79cd7
Explicitly declare OpenSSL condition and URL in the definition files
2013-02-04 17:55:38 -06:00
Jeremy Kemper
959e5cb22b
Build OpenSSL for Ruby 2.0 on OS X.
...
Apple ships a patched, incompatible OpenSSL. We build a compatible
OpenSSL from source.
2013-02-04 11:01:05 -07:00
Jeremy Kemper
a4b0337f93
Ruby 2.0 trunk now bundles libyaml and falls back to it if not available on your OS
2012-11-28 13:10:20 -07:00
Sam Stephenson
ebed6000e8
Verify MD5 checksums of tarballs downloaded with install_package
...
Checksums are optional and specified as anchors on package URLs.
2012-11-14 19:53:57 -06:00
SHIBATA Hiroshi
786adaff79
fix conflicts. reverted to 70751283b0
.
2012-11-10 17:20:50 +09:00
Erik Michaels-Ober
3fed3b492f
ruby-build 20121104
2012-11-04 15:03:35 -08:00
SHIBATA Hiroshi
70751283b0
switch svn in ruby-head build
2012-10-06 09:17:36 +09:00
Jeremy Kemper
45d4277b1c
GCC is no longer required to build 1.9.3-p125 and later
2012-02-20 23:03:54 -07:00
SHIBATA Hiroshi
836aaf1dc4
s/use_gcc42_on_lion/require_gcc/
2011-10-26 10:55:35 +09:00
Jeremy Kemper
4929d35248
Ruby trunk is now 2.0.0-dev. RubyGems 1.8.10 is included so we needn't install it separately.
2011-10-19 10:59:26 -05:00