Andreas Fuchs
45067e752f
Install libyaml 0.1.5 for 2.x rubies also
...
This should plug the vulnerability to CVE-2013-6393 (and fix #504 )
that can still occur in certain systems: If the ruby build process
couldn't find a libyaml that worked, it would build its own vendored
libyaml, which was 0.1.4 (and is vulnerable).
Instead, specify that the build always should install the latest
libyaml & build against that.
2014-02-07 15:41:03 -08:00
SHIBATA Hiroshi
de33fa8af4
rename hostname, ftp.ruby-lang.org is used by ftp protocol too.
2013-09-07 14:54:07 +09:00
SHIBATA Hiroshi
b122c90476
use http, because http://ftp.ruby-lang.org is deliveried by fastly
2013-09-07 12:53:02 +09:00
SHIBATA Hiroshi
df05cd06a1
manually reverted using mirror site. and use https protocols
2013-09-07 07:50:15 +09:00
SHIBATA Hiroshi
af3f77e900
use www.dnsbalance.ring.gr.jp
2013-08-16 10:58:50 +09:00
Mark Przepiora
f556b4a34c
Change protocol of the ruby-lang.org server from HTTP to FTP
2013-08-05 23:18:03 -06:00
Mark Madsen
ea21ec4ee3
fixed typo when openssl-1.0.1e was added to ruby 2.0.0
2013-02-11 17:02:43 -07:00
Erik Michaels-Ober
ffef047307
Upgrade to OpenSSL 1.0.1e
2013-02-11 15:39:03 -08:00
Jeremy Kemper
b5baf47dae
Upgrade to OpenSSL 1.0.1d, released 2013-02-05
2013-02-08 17:36:08 -07:00
Sam Stephenson
243e6fbecf
Support conditional package installation with --if <test>
2013-02-08 16:48:02 -06:00
Sam Stephenson
fdfe71c061
Merge master
2013-02-08 15:29:23 -06:00
Lucas Uyezu
c3215b9b87
Add 2.0.0-rc2
2013-02-08 17:54:29 -02:00