Commit graph

25 commits

Author SHA1 Message Date
Mislav Marohnić
875ded8c69 Upgrade OpenSSL to 1.0.2f across the board 2016-01-30 18:16:28 +11:00
deepj
c9a3e265ef Upgrade to OpenSSL 1.0.1r and 1.0.2f 2016-01-30 02:03:10 +01:00
Mislav Marohnić
2fb01bce7b Merge branch 'bz2' 2015-12-29 15:23:52 +01:00
Mislav Marohnić
3fe1eaf98a Add LDFLAGS workaround to Ruby 2.1.0
References af2ffeb673
2015-12-29 14:23:55 +01:00
deepj
ce36ebe300 Convert MRI definitions to use bz2 tarballs instead of gz ones 2015-12-25 16:41:42 +01:00
deepj
e59482d9f8 Upgrade to OpenSSL 1.0.1q 2015-12-03 20:28:36 +01:00
Reed Loden
0e2281cced Update Ruby download location to use https:// 2015-07-20 12:45:12 -07:00
deepj
d989a9b0bf Upgrade OpenSSL to 1.0.1p 2015-07-09 15:41:39 +02:00
deepj
b7363f749b Upgrade OpenSSL to 1.0.1o 2015-06-12 18:33:59 +02:00
deepj
e3f622ee50 Upgrade OpenSSL to 1.0.1n 2015-06-11 23:38:33 +02:00
SHIBATA Hiroshi
97b9999767 Remove needless build flag for some 2.1.x versions. Fixed #634 2015-04-19 18:00:37 +09:00
deepj
54d0000e06 Upgrade openssl-1.0.1m 2015-03-19 21:10:52 +01:00
deepj
67a0338480 Upgrade openssl-1.0.1l 2015-01-16 08:48:44 +01:00
deepj
56b3989b1c Upgrade openssl-1.0.1k 2015-01-08 22:28:11 +01:00
SHIBATA Hiroshi
5d738abbc9 upgrade openssl-1.0.1j 2014-10-16 09:48:04 +09:00
Holger Just
e90cb88c41 Upgrade OpenSSL library to 1.0.1i
Previous versions of the library contain several vulnerabilities:
https://www.openssl.org/news/secadv_20140806.txt
2014-09-24 14:23:06 +02:00
deg84
ee04b9d3c5 OpenSSL library updated to 1.0.1h
Previous versions of the library contain a vulnerability CVE-2014-0224.
2014-06-06 01:30:29 +09:00
Thomas Johansen
e9d59cb0cc Replace all MD5 checksums with SHA2 checksums 2014-05-23 14:39:41 +07:00
Vadim Golub
7bb33b04af OpenSSL library updated to 1.0.1g
Previous versions of the library contain a vulnerability CVE-2014-0160.
2014-04-08 01:51:57 +03:00
Jose Luis Salas
53920b0fe1 Update libyaml to 0.1.6
Security fix for CVE-2014-2525

Advisory: http://www.ocert.org/advisories/ocert-2014-003.html
2014-03-26 21:17:10 +01:00
Andreas Fuchs
45067e752f Install libyaml 0.1.5 for 2.x rubies also
This should plug the vulnerability to CVE-2013-6393 (and fix #504)
that can still occur in certain systems: If the ruby build process
couldn't find a libyaml that worked, it would build its own vendored
libyaml, which was 0.1.4 (and is vulnerable).

Instead, specify that the build always should install the latest
libyaml & build against that.
2014-02-07 15:41:03 -08:00
Erik Michaels-Ober
9e76ceb8bf Revert "Rename 2.1.0 -> 2.1.0-p0"
This reverts commit 36b5f33e53.

See https://twitter.com/hsbt/status/415887230318567424.
2013-12-25 12:13:58 -05:00
Erik Michaels-Ober
36b5f33e53 Rename 2.1.0 -> 2.1.0-p0 2013-12-25 11:32:47 -05:00
SHIBATA Hiroshi
d228ce9ab3 added md5 2013-12-26 01:00:56 +09:00
SHIBATA Hiroshi
b971d6bacd preparation of Ruby 2.1 2013-12-22 19:05:09 +09:00