Commit graph

31 commits

Author SHA1 Message Date
deepj
95d3e4a373 Upgrade to OpenSSL 1.0.2n 2017-12-10 23:18:02 +01:00
deepj
b161260278 Fix OpenSSL version 2017-11-06 04:36:49 +01:00
deepj
88767ed228 Upgrade to OpenSSL 1.0.2m 2017-11-03 15:56:10 +01:00
Jeremy Daer
d595eaca4e Ruby 2.1 reached end of life on 2017-03-31 2017-06-12 09:56:25 -07:00
deepj
8783a38d5f Upgrade to OpenSSL 1.0.2l 2017-05-25 21:52:36 +02:00
deepj
5953bab822 Upgrade to OpenSSL 1.0.2k 2017-01-26 17:54:31 +01:00
deepj
9e6ffc5e68 Upgrade to OpenSSL 1.0.2j 2016-09-27 09:49:06 +02:00
deepj
9f7c2375d1 Upgrade to OpenSSL 1.0.2i 2016-09-23 10:20:18 +02:00
deepj
ecaf998a64 Upgrade to OpenSSL 1.0.2h 2016-05-03 16:36:45 +02:00
Jeremy Daer
2617f400de
Warn when installing an unsupported or end-of-lifed Ruby
Fixes #742
2016-04-29 22:56:28 -07:00
deepj
07190b062b Upgrade to OpenSSL 1.0.2g 2016-03-03 10:39:23 +01:00
Mislav Marohnić
875ded8c69 Upgrade OpenSSL to 1.0.2f across the board 2016-01-30 18:16:28 +11:00
deepj
c9a3e265ef Upgrade to OpenSSL 1.0.1r and 1.0.2f 2016-01-30 02:03:10 +01:00
deepj
e59482d9f8 Upgrade to OpenSSL 1.0.1q 2015-12-03 20:28:36 +01:00
deepj
d989a9b0bf Upgrade OpenSSL to 1.0.1p 2015-07-09 15:41:39 +02:00
deepj
b7363f749b Upgrade OpenSSL to 1.0.1o 2015-06-12 18:33:59 +02:00
deepj
e3f622ee50 Upgrade OpenSSL to 1.0.1n 2015-06-11 23:38:33 +02:00
deepj
54d0000e06 Upgrade openssl-1.0.1m 2015-03-19 21:10:52 +01:00
deepj
67a0338480 Upgrade openssl-1.0.1l 2015-01-16 08:48:44 +01:00
deepj
56b3989b1c Upgrade openssl-1.0.1k 2015-01-08 22:28:11 +01:00
SHIBATA Hiroshi
5d738abbc9 upgrade openssl-1.0.1j 2014-10-16 09:48:04 +09:00
Holger Just
e90cb88c41 Upgrade OpenSSL library to 1.0.1i
Previous versions of the library contain several vulnerabilities:
https://www.openssl.org/news/secadv_20140806.txt
2014-09-24 14:23:06 +02:00
deg84
ee04b9d3c5 OpenSSL library updated to 1.0.1h
Previous versions of the library contain a vulnerability CVE-2014-0224.
2014-06-06 01:30:29 +09:00
Thomas Johansen
e9d59cb0cc Replace all MD5 checksums with SHA2 checksums 2014-05-23 14:39:41 +07:00
Vadim Golub
7bb33b04af OpenSSL library updated to 1.0.1g
Previous versions of the library contain a vulnerability CVE-2014-0160.
2014-04-08 01:51:57 +03:00
SHIBATA Hiroshi
436735420c remove build of libyaml, because bundled libyaml is already updated 2014-02-24 13:02:19 +09:00
Andreas Fuchs
45067e752f Install libyaml 0.1.5 for 2.x rubies also
This should plug the vulnerability to CVE-2013-6393 (and fix #504)
that can still occur in certain systems: If the ruby build process
couldn't find a libyaml that worked, it would build its own vendored
libyaml, which was 0.1.4 (and is vulnerable).

Instead, specify that the build always should install the latest
libyaml & build against that.
2014-02-07 15:41:03 -08:00
SHIBATA Hiroshi
945553bbef fix some wrong name 2013-12-26 01:53:06 +09:00
SHIBATA Hiroshi
b971d6bacd preparation of Ruby 2.1 2013-12-22 19:05:09 +09:00
Mislav Marohnić
50bf60f9c2 Really fix installing Ruby 2.1.0 from trunk
The problem wasn't in quoting as per 0b5206172, but in the fact that
Ruby trunk added a LDFLAGS checker that aborts if any of the paths
listed in it are missing:
3636f8c0f5

This is probably a bug in Ruby, but for now a simple workaround is to
iterate through paths in LDFLAGS and ensure they exist.

References #441
2013-10-27 21:32:18 +01:00
SHIBATA Hiroshi
81bbb68de6 bump versions to 2.1.0 2013-02-25 13:04:17 +09:00