ruby-devel-1.8.7.p357-0.36.1e>UA(;?RJAK82}?QI9$j5%>FAt6m fTO{g ,#=oM]R:>5!Q?!Ad   F 28@   0  |Pp(89H:FGHHIXY\](^bc d!e!f!l!!z!1Cruby-devel1.8.7.p3570.36.1Development files to link against RubyDevelopment files to link against Ruby. Authors: -------- Yukihiro Matsumoto QI9cloud1250mopenSUSE 11.4openSUSEGPL-2.0+http://bugs.opensuse.orgDevelopment/Languages/Rubyhttp://www.ruby-lang.org/linuxi586.{" xMH 3#W JP-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.so.1.8.7rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootruby-1.8.7.p357-0.36.1.src.rpmruby-develruby-devel(x86-32)   rubyrpmlib(PayloadFilesHavePrefix)rpmlib(CompressedFileNames)rpmlib(PayloadIsLzma)1.8.7.p3574.0-13.0.4-14.4.6-14.8.0QکQT0P{@O@N@MMc@L)@L-L,@KK:@K~@K@KepKbK(J:johann.luce@wanadoo.frlijewski.stefan@gmail.commrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.decrrodriguez@opensuse.orgmrueckert@suse.demeissner@suse.demrueckert@suse.dejengelh@medozas.dejansimon.moeller@opensuse.org- fix cve-2013-4073 (bnc#827265) The fix_cve-2013-4073.patch contains the patch for cve-2013-4073 (bnc#827265) adapted from https://build.opensuse.org/package/view_file/openSUSE:Maintenance:1837/ruby19.openSUSE_12.2_Update?expand=1&file=fix_cve-2013-4073.patch- added CVE-2013-1821.patch: (bnc#808137) Fix entity expansion DoS vulnerability in REXML. When reading text nodes from an XML document, the REXML parser could be coerced into allocating extremely large string objects which could consume all available memory on the system. CVE-2013-1821 (Patch taken from debian (Salvatore Bonaccorso))- added ruby-1.8.7_safe_level_bypass.patch: (bnc#783525) Fixes a SAFE_LEVEL bypass in name_err_to_s. CVE-2012-4466- update to 1.8.7.p357 (bnc#739122) - randomize hash to avoid algorithmic complexity attacks. CVE-2011-4815 - initialization of hash_seed to be at the beginning of the process. - initialize random seed at first. - call OpenSSL::Random.seed at the SecureRandom.random_bytes call. insert separators for array join. patch by Masahiro Tomita. [ruby-dev:44270] - mkconfig.rb: fix for continued lines. based on a patch from Marcus Rueckert at [ruby-core:20420]. - Infinity is greater than any bignum number. [ruby-dev:38672] - initialize store->ex_data.sk. [ruby-core:28907] [ruby-core:23971] [ruby-core:18121]- update to 1.8.7.p352 (Fate #312657) (bnc#704409) - support for openssl compiled without SSLv2 - multilib support for tk build - some IPv6 related fixes - zlib fixes - reinitialize PRNG when forking children (CVE-2011-2686/CVE-2011-3009) - securerandom fixes (CVE-2011-2705) - uri route_to fixes - fix race condition with variables and autoload - switched rb_arch macro to use RUBY_PLATFORM - dropped patches: 1887f60a8540f64f5c7bb14d57c0be70506941b8.patch ruby-1.8.7.p22_tcltk-multilib.patch ruby-1.8.7-p334.tar.bz2 ruby-1.8.x_bigdecimal_memory_corruption.patch - new patches ruby-1.8.x_rubylibdir.patch- added ruby-1.8.x_bigdecimal_memory_corruption.patch: dont cast parameter to unsigned int in the alloc and later memset the original value. (bnc#682287) CVE-2011-0188- update to 1.8.7.p334 (bnc#673740, bnc#673750, bnc#600752) - A symlink race condition vulnerability was found in FileUtils.remove_entry_secure. The vulnerability allows local users to delete arbitrary files and directories. CVE-2011-1004 - Exception#to_s method can be used to trick $SAFE check, which makes a untrusted codes to modify arbitrary strings. CVE-2011-1005 - Ruby WEBrick character set issue (XSS) CVE-2010-0541 for all non security changes see /usr/share/doc/packages/ruby/ChangeLog - refreshed ruby-1.8.x_openssl_branch_update.patch - buildrequires openssl to make the last openssl test work - https://github.com/ruby/ruby/commit/1887f60a8540f64f5c7bb14d57c0be70506941b8.patch * ext/zlib/zlib.c (zstream_append_input2): add RB_GC_GUARD. This caused failure when test/csv is executed with GC.stress = true. - added ruby-1.8.7.p334_remove_zlib_test_params_test.patch: remove the test_params patch from backport in r27917 It doesnt pass atm. - removed ruby-1.8.6.p36_socket_ipv6.patch: included upstream- the testsuite and doc-html package should of course require the main package- add ruby(abi) = 1.8 provides- update to 1.8.7.p299 (bnc#606056 and bnc#603914) - OpenSSL 1.0.0 support - Use OpenSSL engines which exist - Fixed range and chunked support for Net::HTTP - Iconv fixes - Backported pack/unpack from the 1.9 branch (bnc#606056 bnc#603914) - Multiple fixes in the resolver - Fixed Unicode inspection bug. - Escape characters properly for the accesslog (bnc#570616) - cleaned up rpmlintrc - refreshed patches: old: ruby-1.8.7.p22_lib64.patch new: ruby-1.8.7.p299_lib64.patch old: ruby_1.8.6.p36_date_remove_privat.patch new: ruby-1.8.7.p299_date_remove_privat.patch old: ruby-pedantic-headers.diff new: ruby-1.8.7.p299_pedantic-headers.patch - replaced patches ruby-1.8.x_openssl-1.0.patch and ruby-1.8.x_openssl-1.0-tests.patch with ruby-1.8.x_openssl_branch_update.patch- fix build on ix86: - -target got removed from the %configure macro. add it back locally for now.- added ruby-1.8.x_openssl-1.0.patch and ruby-1.8.x_openssl-1.0-tests.patch: fix building with openssl 1.0.0 (taken from svn) - added ruby-1.8.x_yaml2byte.patch: fix warning about sequence point - remove requires on glibc-devel again- ruby-devel requires glibc-devel- added ruby-1.8.x_digest_non_void_return.patch: patch pulled from SVN to fix the warnings about no return in non-void functions.- ruby calls "ppc" "powerpc".- update to 1.8.7p249 small big fix release in the 1.8.7 branch, this includes the fix for: - ruby webrick doesn't sanitize non-printable characters in log (bnc#570616) CVE-2009-4492 - drop ruby-1.8.6.p36_gc.patch: solution is upstream- package documentation as noarch - adjust ruby.macros to ask the ruby binary for the target plaform. This is because %_host_cpu can expand to sparc64, while ruby is built for the sparcv9 target, and %_target_cpu can expand to noarch. - in ruby.spec, %rb_arch is statically reset to %_target_cpu, as we need the target name. Since it won't be noarch in this case, that is good.- remove s/armv5tel/armv4l/ in macros as it breaks build for armv5telcloud125 1373522233644677 766666666666661.8.7.p357-0.36.11.8.7.p357-0.36.1libruby-static.alibruby.soconfig.hdefines.hdigest.hdl.hdlconfig.hdln.henv.hintern.hmissing.hnode.hre.hregex.hruby.hrubyio.hrubysig.hst.hutil.hversion.h/usr/lib//usr/lib/ruby/1.8/i586-linux/-fomit-frame-pointer -fmessage-length=0 -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector -funwind-tables -fasynchronous-unwind-tables -gobs://build.opensuse.org/openSUSE:Evergreen:Maintenance:151/openSUSE_Evergreen_11.4/5b351662179f30d2c669336c58215f47-ruby.openSUSE_Evergreen_11.4drpmlzma5i586-suse-linux2,@J+ ?]"k%<|hNFom kdѷ+%s8v^B8MVd!c4#@lզYPb>͍t`TS3yrB}YF<ϖ:v Kn[QS؝ "DŒq!5u%/hFijgw_89s[H:lm0)~v4sT8_;)5}t ӨUVźal6[q,U .J<8zƒ4tTB&OO;< wcȅU^6ǛN%q |T ՐEW^:rSWt5n疣ePOt>]kSyggH}ޘ_NI՞lv1P-HA2N@(\\ gd|'©Hߘϰ0ks;o Ƭw=Ƙ{.@,m_2n!rTNeMGVÙ[$G2y/1+T.AXt/~vY'/hXJC,Лܘ!Cz>6۲$abirK!94lCmTPSZ>w_.Y\;5