Package "ruby2.7-dev"

Name: ruby2.7-dev


Header files for compiling extension modules for the Ruby 2.7

Latest version: 2.7.0-5ubuntu1.5
Release: focal (20.04)
Level: updates
Repository: main
Head package: ruby2.7
Homepage: https://www.ruby-lang.org/


Download "ruby2.7-dev"

Other versions of "ruby2.7-dev" in Focal

Repository Area Version
base main 2.7.0-5ubuntu1
security main 2.7.0-5ubuntu1.5


Version: 2.7.0-5ubuntu1.5 2021-07-21 17:06:21 UTC

  ruby2.7 (2.7.0-5ubuntu1.5) focal-security; urgency=medium

  * SECURITY UPDATE: Command injection vulnerability in RDoc
    - debian/patches/CVE-2021-31799.patch: fix replace open for File.open
      in lib/rdoc/rdoc.rb, test/rdoc/test_rdoc_rdoc.rb.
    - CVE-2021-31799
  * SECURITY UPDATE: Information leak
    - debian/patches/CVE-2021-31810.patch: ignore IP address in PASV
      responses by default and add new option use_pasv_ip in lib/net/ftp.rb,
    - CVE-2021-31810
  * SECURITY UPDATE: Stripping vulnerability
    - debian/patches/CVE-2021-32066.patch: fix raising an exception
      when a unknow response error happens in
      lib/net/imap.rb, test/net/imap/test_imap.rb.
    - CVE-2021-32066

 -- Leonidas Da Silva Barbosa <email address hidden> Thu, 15 Jul 2021 16:18:39 -0300

Source diff to previous version
CVE-2021-31799 A command injection vulnerability in RDoc
CVE-2021-31810 An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick
CVE-2021-32066 A StartTLS stripping vulnerability in Net::IMAP

Version: 2.7.0-5ubuntu1.4 2021-04-20 20:06:28 UTC

  ruby2.7 (2.7.0-5ubuntu1.4) focal-security; urgency=medium

  * SECURITY UPDATE: XML round-trip vulnerability in REXML
    - debian/patches/CVE-2021-28965.patch: backport fixes from REXML
    - CVE-2021-28965

 -- Marc Deslauriers <email address hidden> Thu, 15 Apr 2021 10:38:03 -0400

Source diff to previous version

Version: 2.7.0-5ubuntu1.3 2021-03-18 20:07:12 UTC

  ruby2.7 (2.7.0-5ubuntu1.3) focal-security; urgency=medium

  * SECURITY UPDATE: sensitive info disclosure in BasicSocket#read_nonblock
    - debian/patches/CVE-2020-10933.patch: do not return uninitialized
      buffer in ext/socket/init.c.
    - CVE-2020-10933
  * SECURITY UPDATE: HTTP Request Smuggling attack in WEBrick
    - debian/patches/CVE-2020-25613.patch: make it more strict to interpret
      some headers in lib/webrick/httprequest.rb.
    - CVE-2020-25613

 -- Marc Deslauriers <email address hidden> Tue, 16 Mar 2021 10:56:44 -0400

Source diff to previous version
CVE-2020-10933 An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buff
CVE-2020-25613 An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not

Version: 2.7.0-5ubuntu1.2 2020-11-25 01:11:32 UTC

  ruby2.7 (2.7.0-5ubuntu1.2) focal; urgency=medium

  * d/p/arm64-optimizations.patch: enable arm64 optimizations that exist for
    power/x86. It includes enabling unaligned memory access, gc and vm_exec.c
    optimizations (LP: #1901074).

 -- Lucas Kanashiro <email address hidden> Wed, 14 Oct 2020 14:55:55 -0300

Source diff to previous version
1901074 [SRU] Enable some arm64 performance optimizations already available for other architectures

Version: 2.7.0-5ubuntu1.1 2020-05-21 09:06:32 UTC

  ruby2.7 (2.7.0-5ubuntu1.1) focal; urgency=medium

  * d/control: do not provide ruby-bundler (LP: #1876912).
    libruby2.7 provides only ruby-bundler library and not its binary.

 -- Lucas Kanashiro <email address hidden> Tue, 05 May 2020 15:12:42 -0300

1876912 [SRU] libruby2.7 provides ruby-bundler library but its binary is missing

About   -   Send Feedback to @ubuntu_updates