Date: Sun, 24 Nov 2013 05:36:29 +0000 (UTC) From: Steve Wills <swills@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r334705 - in head: devel/ruby-gems security/vuxml Message-ID: <201311240536.rAO5aTAX059344@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: swills Date: Sun Nov 24 05:36:28 2013 New Revision: 334705 URL: http://svnweb.freebsd.org/changeset/ports/334705 Log: - Update devel/ruby-gems to 1.8.28 - Document security issues with 1.8.26 and 1.8.27 (CVE-2013-4287 and CVE-2013-4363) Security: 742eb9e4-e3cb-4f5a-b94e-0e9a39420600 Security: 54237182-9635-4a8b-92d7-33bfaeed84cd Modified: head/devel/ruby-gems/Makefile head/devel/ruby-gems/distinfo head/devel/ruby-gems/pkg-plist (contents, props changed) head/security/vuxml/vuln.xml Modified: head/devel/ruby-gems/Makefile ============================================================================== --- head/devel/ruby-gems/Makefile Sun Nov 24 01:29:02 2013 (r334704) +++ head/devel/ruby-gems/Makefile Sun Nov 24 05:36:28 2013 (r334705) @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= gems -PORTVERSION= 1.8.25 +PORTVERSION= 1.8.28 CATEGORIES= devel ruby MASTER_SITES= ${MASTER_SITE_RUBYGEMS:S/\/gems\//\/rubygems\//} PKGNAMEPREFIX= ${RUBY_PKGNAMEPREFIX} @@ -43,7 +43,7 @@ NO_STAGE= yes do-install: @${MKDIR} ${PREFIX}/${GEMS_DOC_BASE_DIR}/ @${TOUCH} ${PREFIX}/${GEMS_DOC_BASE_DIR}/.keep_this - cd ${WRKSRC}; ${RUBY} ${RUBY_SETUP} ${RUBY_SETUP_OPTIONS} + cd ${WRKSRC}; ${SETENV} ${GEM_ENV} ${RUBY} ${RUBY_SETUP} ${RUBY_SETUP_OPTIONS} post-install: @${LN} -sf ${PREFIX}/bin/gem${RUBY_VER_SHORT} ${PREFIX}/bin/gem Modified: head/devel/ruby-gems/distinfo ============================================================================== --- head/devel/ruby-gems/distinfo Sun Nov 24 01:29:02 2013 (r334704) +++ head/devel/ruby-gems/distinfo Sun Nov 24 05:36:28 2013 (r334705) @@ -1,2 +1,2 @@ -SHA256 (ruby/rubygems-1.8.25.tgz) = 649348ddf8746887fb1ee79c55dc508f0627d3d0bfa7fcdbcd4edb24908f1cc8 -SIZE (ruby/rubygems-1.8.25.tgz) = 380540 +SHA256 (ruby/rubygems-1.8.28.tgz) = f5f1aae263cd7f44634adf47733a5521f676ce76f19006db85d78c685defed39 +SIZE (ruby/rubygems-1.8.28.tgz) = 270451 Modified: head/devel/ruby-gems/pkg-plist ============================================================================== --- head/devel/ruby-gems/pkg-plist Sun Nov 24 01:29:02 2013 (r334704) +++ head/devel/ruby-gems/pkg-plist Sun Nov 24 05:36:28 2013 (r334705) @@ -84,7 +84,6 @@ bin/gem%%RUBY_VER_SHORT%% %%RUBY_SITELIBDIR%%/rubygems/source_index.rb %%RUBY_SITELIBDIR%%/rubygems/spec_fetcher.rb %%RUBY_SITELIBDIR%%/rubygems/specification.rb -%%RUBY_SITELIBDIR%%/rubygems/ssl_certs/ca-bundle.pem %%RUBY_SITELIBDIR%%/rubygems/syck_hack.rb %%RUBY_SITELIBDIR%%/rubygems/test_case.rb %%RUBY_SITELIBDIR%%/rubygems/test_utilities.rb Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Nov 24 01:29:02 2013 (r334704) +++ head/security/vuxml/vuln.xml Sun Nov 24 05:36:28 2013 (r334705) @@ -51,6 +51,73 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="742eb9e4-e3cb-4f5a-b94e-0e9a39420600"> + <topic>ruby-gems -- Algorithmic Complexity Vulnerability</topic> + <affects> + <package> + <name>ruby19-gems</name> + <range><lt>1.8.27</lt></range> + </package> + <package> + <name>ruby20-gems</name> + <range><lt>1.8.27</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Ruby Gem developers report:</p> + <blockquote cite="http://blog.rubygems.org/2013/09/24/CVE-2013-4363.html"> + <p>The patch for CVE-2013-4363 was insufficiently verified so the + combined regular expression for verifying gem version remains + vulnerable following CVE-2013-4363.</p> + <p>RubyGems validates versions with a regular expression that is + vulnerable to denial of service due to backtracking. For specially + crafted RubyGems versions attackers can cause denial of service + through CPU consumption.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-4363</cvename> + </references> + <dates> + <discovery>2013-09-24</discovery> + <entry>2013-11-24</entry> + </dates> + </vuln> + + <vuln vid="54237182-9635-4a8b-92d7-33bfaeed84cd"> + <topic>ruby-gems -- Algorithmic Complexity Vulnerability</topic> + <affects> + <package> + <name>ruby19-gems</name> + <range><lt>1.8.26</lt></range> + </package> + <package> + <name>ruby20-gems</name> + <range><lt>1.8.26</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Ruby Gem developers report:</p> + <blockquote cite="http://blog.rubygems.org/2013/09/09/CVE-2013-4287.html"> + <p>RubyGems validates versions with a regular expression that is + vulnerable to denial of service due to backtracking. For specially + crafted RubyGems versions attackers can cause denial of service + through CPU consumption.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-4287</cvename> + </references> + <dates> + <discovery>2013-09-09</discovery> + <entry>2013-11-24</entry> + </dates> + </vuln> + <vuln vid="cc9043cf-7f7a-426e-b2cc-8d1980618113"> <topic>ruby -- Heap Overflow in Floating Point Parsing</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201311240536.rAO5aTAX059344>