Skip to content

CentOS 7 - SCL for x86_64: development/libraries: rh-ruby24-rubygem-json

rh-ruby24-rubygem-json - This is a JSON implementation as a Ruby extension in C

Website: http://ruby-lang.org/
License: (Ruby or GPLv2) and UCD
Vendor: CentOS
Description:
This is a implementation of the JSON specification according to RFC 4627.
You can think of it as a low fat alternative to XML, if you want to store
data to disk or transmit it over a network rather than use a verbose
markup language.

Packages

rh-ruby24-rubygem-json-2.0.4-92.el7.x86_64 [81 KiB] Changelog by Jun Aruga (2019-04-11):
- Upgrade to Ruby 2.4.6.
- Delete directory using symlink when decompressing tar
  Resolves: CVE-2019-8320
- Fix escape sequence injection vulnerability in verbose.
  Resolves: CVE-2019-8321
- Fix escape sequence injection vulnerability in gem owner.
  Resolves: CVE-2019-8322
- Fix escape sequence injection vulnerability in API response handling.
  Resolves: CVE-2019-8323
- Prohibit arbitrary code execution when installing a malicious gem.
  Resolves: CVE-2019-8324
- Fix escape sequence injection vulnerability in errors.
  Resolves: CVE-2019-8325
rh-ruby24-rubygem-json-2.0.4-91.sc1.el7.x86_64 [81 KiB] Changelog by Pavel Valena (2018-11-05):
- Upgrade to Ruby 2.4.5.
  Resolves: CVE-2018-16395
  Resolves: rhbz#1563077
  Removed Patch10: ruby-2.5.0-Disable-Tokyo-TZ-tests.patch; subsumed
- Properly harden package using -fstack-protector-strong.
- Fix: return default path with nonexistent home dir(rhbz#1602879)
rh-ruby24-rubygem-json-2.0.4-90.el7.x86_64 [80 KiB] Changelog by Pavel Valena (2018-03-12):
- Command injection in lib/resolv.rb:lazy_initialize() allows arbitrary code
    execution(CVE-2017-17790).
  * ruby-2.5.0-Fixed-command-Injection.patch
  Related: rhbz#1549651
rh-ruby24-rubygem-json-2.0.2-75.el7.x86_64 [79 KiB] Changelog by Vít Ondruch (2017-01-17):
- Apply patch fixing rubygem-mongo build failures.

Listing created by repoview