Commit graph

12 commits

Author SHA1 Message Date
Andreas Fuchs
45067e752f Install libyaml 0.1.5 for 2.x rubies also
This should plug the vulnerability to CVE-2013-6393 (and fix #504)
that can still occur in certain systems: If the ruby build process
couldn't find a libyaml that worked, it would build its own vendored
libyaml, which was 0.1.4 (and is vulnerable).

Instead, specify that the build always should install the latest
libyaml & build against that.
2014-02-07 15:41:03 -08:00
SHIBATA Hiroshi
de33fa8af4 rename hostname, ftp.ruby-lang.org is used by ftp protocol too. 2013-09-07 14:54:07 +09:00
SHIBATA Hiroshi
b122c90476 use http, because http://ftp.ruby-lang.org is deliveried by fastly 2013-09-07 12:53:02 +09:00
SHIBATA Hiroshi
df05cd06a1 manually reverted using mirror site. and use https protocols 2013-09-07 07:50:15 +09:00
SHIBATA Hiroshi
af3f77e900 use www.dnsbalance.ring.gr.jp 2013-08-16 10:58:50 +09:00
Mark Przepiora
f556b4a34c Change protocol of the ruby-lang.org server from HTTP to FTP 2013-08-05 23:18:03 -06:00
Mark Madsen
ea21ec4ee3 fixed typo when openssl-1.0.1e was added to ruby 2.0.0 2013-02-11 17:02:43 -07:00
Erik Michaels-Ober
ffef047307 Upgrade to OpenSSL 1.0.1e 2013-02-11 15:39:03 -08:00
Jeremy Kemper
b5baf47dae Upgrade to OpenSSL 1.0.1d, released 2013-02-05 2013-02-08 17:36:08 -07:00
Sam Stephenson
243e6fbecf Support conditional package installation with --if <test> 2013-02-08 16:48:02 -06:00
Sam Stephenson
fdfe71c061 Merge master 2013-02-08 15:29:23 -06:00
Lucas Uyezu
c3215b9b87 Add 2.0.0-rc2 2013-02-08 17:54:29 -02:00