deepj
95d3e4a373
Upgrade to OpenSSL 1.0.2n
2017-12-10 23:18:02 +01:00
deepj
b161260278
Fix OpenSSL version
2017-11-06 04:36:49 +01:00
deepj
88767ed228
Upgrade to OpenSSL 1.0.2m
2017-11-03 15:56:10 +01:00
Jeremy Daer
d595eaca4e
Ruby 2.1 reached end of life on 2017-03-31
2017-06-12 09:56:25 -07:00
deepj
8783a38d5f
Upgrade to OpenSSL 1.0.2l
2017-05-25 21:52:36 +02:00
deepj
5953bab822
Upgrade to OpenSSL 1.0.2k
2017-01-26 17:54:31 +01:00
deepj
9e6ffc5e68
Upgrade to OpenSSL 1.0.2j
2016-09-27 09:49:06 +02:00
deepj
9f7c2375d1
Upgrade to OpenSSL 1.0.2i
2016-09-23 10:20:18 +02:00
deepj
ecaf998a64
Upgrade to OpenSSL 1.0.2h
2016-05-03 16:36:45 +02:00
Jeremy Daer
2617f400de
Warn when installing an unsupported or end-of-lifed Ruby
...
Fixes #742
2016-04-29 22:56:28 -07:00
deepj
07190b062b
Upgrade to OpenSSL 1.0.2g
2016-03-03 10:39:23 +01:00
Mislav Marohnić
875ded8c69
Upgrade OpenSSL to 1.0.2f across the board
2016-01-30 18:16:28 +11:00
deepj
c9a3e265ef
Upgrade to OpenSSL 1.0.1r and 1.0.2f
2016-01-30 02:03:10 +01:00
deepj
e59482d9f8
Upgrade to OpenSSL 1.0.1q
2015-12-03 20:28:36 +01:00
deepj
d989a9b0bf
Upgrade OpenSSL to 1.0.1p
2015-07-09 15:41:39 +02:00
deepj
b7363f749b
Upgrade OpenSSL to 1.0.1o
2015-06-12 18:33:59 +02:00
deepj
e3f622ee50
Upgrade OpenSSL to 1.0.1n
2015-06-11 23:38:33 +02:00
deepj
54d0000e06
Upgrade openssl-1.0.1m
2015-03-19 21:10:52 +01:00
deepj
67a0338480
Upgrade openssl-1.0.1l
2015-01-16 08:48:44 +01:00
deepj
56b3989b1c
Upgrade openssl-1.0.1k
2015-01-08 22:28:11 +01:00
SHIBATA Hiroshi
5d738abbc9
upgrade openssl-1.0.1j
2014-10-16 09:48:04 +09:00
Holger Just
e90cb88c41
Upgrade OpenSSL library to 1.0.1i
...
Previous versions of the library contain several vulnerabilities:
https://www.openssl.org/news/secadv_20140806.txt
2014-09-24 14:23:06 +02:00
deg84
ee04b9d3c5
OpenSSL library updated to 1.0.1h
...
Previous versions of the library contain a vulnerability CVE-2014-0224.
2014-06-06 01:30:29 +09:00
Thomas Johansen
e9d59cb0cc
Replace all MD5 checksums with SHA2 checksums
2014-05-23 14:39:41 +07:00
Vadim Golub
7bb33b04af
OpenSSL library updated to 1.0.1g
...
Previous versions of the library contain a vulnerability CVE-2014-0160.
2014-04-08 01:51:57 +03:00
SHIBATA Hiroshi
436735420c
remove build of libyaml, because bundled libyaml is already updated
2014-02-24 13:02:19 +09:00
Andreas Fuchs
45067e752f
Install libyaml 0.1.5 for 2.x rubies also
...
This should plug the vulnerability to CVE-2013-6393 (and fix #504 )
that can still occur in certain systems: If the ruby build process
couldn't find a libyaml that worked, it would build its own vendored
libyaml, which was 0.1.4 (and is vulnerable).
Instead, specify that the build always should install the latest
libyaml & build against that.
2014-02-07 15:41:03 -08:00
SHIBATA Hiroshi
945553bbef
fix some wrong name
2013-12-26 01:53:06 +09:00
SHIBATA Hiroshi
b971d6bacd
preparation of Ruby 2.1
2013-12-22 19:05:09 +09:00
Mislav Marohnić
50bf60f9c2
Really fix installing Ruby 2.1.0 from trunk
...
The problem wasn't in quoting as per 0b5206172
, but in the fact that
Ruby trunk added a LDFLAGS checker that aborts if any of the paths
listed in it are missing:
3636f8c0f5
This is probably a bug in Ruby, but for now a simple workaround is to
iterate through paths in LDFLAGS and ensure they exist.
References #441
2013-10-27 21:32:18 +01:00
SHIBATA Hiroshi
81bbb68de6
bump versions to 2.1.0
2013-02-25 13:04:17 +09:00