deepj 
								
							 
						 
						
							
							
							
							
								
							
							
								54d0000e06 
								
							 
						 
						
							
							
								
								Upgrade openssl-1.0.1m  
							
							
							
						 
						
							2015-03-19 21:10:52 +01:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									deepj 
								
							 
						 
						
							
							
							
							
								
							
							
								67a0338480 
								
							 
						 
						
							
							
								
								Upgrade openssl-1.0.1l  
							
							
							
						 
						
							2015-01-16 08:48:44 +01:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									deepj 
								
							 
						 
						
							
							
							
							
								
							
							
								56b3989b1c 
								
							 
						 
						
							
							
								
								Upgrade openssl-1.0.1k  
							
							
							
						 
						
							2015-01-08 22:28:11 +01:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									SHIBATA Hiroshi 
								
							 
						 
						
							
							
							
							
								
							
							
								5d738abbc9 
								
							 
						 
						
							
							
								
								upgrade openssl-1.0.1j  
							
							
							
						 
						
							2014-10-16 09:48:04 +09:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									Holger Just 
								
							 
						 
						
							
							
							
							
								
							
							
								e90cb88c41 
								
							 
						 
						
							
							
								
								Upgrade OpenSSL library to 1.0.1i  
							
							... 
							
							
							
							Previous versions of the library contain several vulnerabilities:
https://www.openssl.org/news/secadv_20140806.txt  
							
						 
						
							2014-09-24 14:23:06 +02:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									deg84 
								
							 
						 
						
							
							
							
							
								
							
							
								ee04b9d3c5 
								
							 
						 
						
							
							
								
								OpenSSL library updated to 1.0.1h  
							
							... 
							
							
							
							Previous versions of the library contain a vulnerability CVE-2014-0224. 
							
						 
						
							2014-06-06 01:30:29 +09:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									Thomas Johansen 
								
							 
						 
						
							
							
							
							
								
							
							
								e9d59cb0cc 
								
							 
						 
						
							
							
								
								Replace all MD5 checksums with SHA2 checksums  
							
							
							
						 
						
							2014-05-23 14:39:41 +07:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									Vadim Golub 
								
							 
						 
						
							
							
							
							
								
							
							
								7bb33b04af 
								
							 
						 
						
							
							
								
								OpenSSL library updated to 1.0.1g  
							
							... 
							
							
							
							Previous versions of the library contain a vulnerability CVE-2014-0160. 
							
						 
						
							2014-04-08 01:51:57 +03:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									Jose Luis Salas 
								
							 
						 
						
							
							
							
							
								
							
							
								53920b0fe1 
								
							 
						 
						
							
							
								
								Update libyaml to 0.1.6  
							
							... 
							
							
							
							Security fix for CVE-2014-2525
Advisory: http://www.ocert.org/advisories/ocert-2014-003.html  
							
						 
						
							2014-03-26 21:17:10 +01:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									Andreas Fuchs 
								
							 
						 
						
							
							
							
							
								
							
							
								45067e752f 
								
							 
						 
						
							
							
								
								Install libyaml 0.1.5 for 2.x rubies also  
							
							... 
							
							
							
							This should plug the vulnerability to CVE-2013-6393 (and fix  #504 )
that can still occur in certain systems: If the ruby build process
couldn't find a libyaml that worked, it would build its own vendored
libyaml, which was 0.1.4 (and is vulnerable).
Instead, specify that the build always should install the latest
libyaml & build against that. 
							
						 
						
							2014-02-07 15:41:03 -08:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									SHIBATA Hiroshi 
								
							 
						 
						
							
							
							
							
								
							
							
								de33fa8af4 
								
							 
						 
						
							
							
								
								rename hostname, ftp.ruby-lang.org is used by ftp protocol too.  
							
							
							
						 
						
							2013-09-07 14:54:07 +09:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									SHIBATA Hiroshi 
								
							 
						 
						
							
							
							
							
								
							
							
								b122c90476 
								
							 
						 
						
							
							
								
								use http, because  http://ftp.ruby-lang.org  is deliveried by fastly  
							
							
							
						 
						
							2013-09-07 12:53:02 +09:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									SHIBATA Hiroshi 
								
							 
						 
						
							
							
							
							
								
							
							
								df05cd06a1 
								
							 
						 
						
							
							
								
								manually reverted using mirror site. and use https protocols  
							
							
							
						 
						
							2013-09-07 07:50:15 +09:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									SHIBATA Hiroshi 
								
							 
						 
						
							
							
							
							
								
							
							
								af3f77e900 
								
							 
						 
						
							
							
								
								use www.dnsbalance.ring.gr.jp  
							
							
							
						 
						
							2013-08-16 10:58:50 +09:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									Mark Przepiora 
								
							 
						 
						
							
							
							
							
								
							
							
								f556b4a34c 
								
							 
						 
						
							
							
								
								Change protocol of the ruby-lang.org server from HTTP to FTP  
							
							
							
						 
						
							2013-08-05 23:18:03 -06:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									SHIBATA Hiroshi 
								
							 
						 
						
							
							
							
							
								
							
							
								3c94f7f696 
								
							 
						 
						
							
							
								
								switched http  
							
							
							
						 
						
							2013-02-24 18:13:53 +09:00 
							
								 
							
							
								 
							
						 
					 
				
					
						
							
								
								
									SHIBATA Hiroshi 
								
							 
						 
						
							
							
							
							
								
							
							
								3083add866 
								
							 
						 
						
							
							
								
								Added a definition for 2.0.0-p0  
							
							
							
						 
						
							2013-02-24 18:09:45 +09:00