Пакет rubygem-irb-1.13.1-11.el10_1.noarch
| Имя | rubygem-irb |
|---|---|
| Эпоха | 0 |
| Версия | 1.13.1 |
| Релиз | 11.el10_1 |
| Архитектура | noarch |
| Сайт | https://www.ruby-lang.org/ |
| Лицензия | Ruby OR BSD-2-Clause |
| Время сборки | 2025-12-12 18:49:25 |
| Хост сборки | builder-x86-03.inferitos.ru |
| Краткое описание | The Interactive Ruby |
| Репозитории | AppStream |
| Полное описание | The irb is acronym for Interactive Ruby. It evaluates ruby expression from the terminal. |
| Эррата | — |
| Размер | 115 КиБ |
| Исходный проект | ruby-3.3.10-11.el10_1 |
| Контрольная сумма SHA-256 | ce4b2a32553834bc66ccef684deb261208902b43fe02d994d0009d50f018ebce |
×
* Thu Nov 13 2025 Jun Aruga <jaruga@redhat.com> - 3.3.10-11 - Upgrade to Ruby 3.3.10. Resolves: RHEL-130160 - Fix possible denial of service in resolv gem (CVE-2025-24294) - Fix URI Credential Leakage Bypass previous fixes. (CVE-2025-61594) - Fix REXML denial of service. (CVE-2025-58767) Resolves: RHEL-122028 * Tue May 27 2025 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 3.3.8-10 - Rebuilt for MSVSphere 10 * Mon Apr 14 2025 Jarek Prokop <jprokop@redhat.com> - 3.3.8-10 - Upgrade to Ruby 3.3.8. Resolves: RHEL-87342 - Fix Net::IMAP vulnerable to possible DoS by memory exhaustion. (CVE-2025-25186) - Fix Denial of Service in CGI::Cookie.parse. (CVE-2025-27219) Resolves: RHEL-86116 - Fix userinfo leakage in URI#join, URI#merge and URI#+. (CVE-2025-27221) * Thu Jan 30 2025 Jun Aruga <jaruga@redhat.com> - 3.3.7-9 - Upgrade to Ruby 3.3.7 Resolves: RHEL-77994 - Fix Ruby OpenSSL to respect crypto-policies TLS minimal version. Resolves: RHEL-21019 * Tue Oct 29 2024 Troy Dawson <tdawson@redhat.com> - Bump release for October 2024 mass rebuild: Resolves: RHEL-64018 * Wed Sep 04 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.5-7 - Upgrade to Ruby 3.3.5 Resolves: RHEL-59035 - Fix DoS vulnerability in rexml. (CVE-2024-39908) (CVE-2024-41946) (CVE-2024-43398) Resolves: RHEL-57047 Resolves: RHEL-57059 Resolves: RHEL-57070 - Fix REXML DoS when parsing an XML having many specific characters such as whitespace character, >] and ]>. (CVE-2024-41123) Resolves: RHEL-52802 * Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com> - Bump release for June 2024 mass rebuild * Thu May 09 2024 Jun Aruga <jaruga@redhat.com> - 3.3.1-5 - Upgrade to Ruby 3.3.1. Resolves: RHEL-33975 - Fix buffer overread vulnerability in StringIO. Resolves: RHEL-34124 - Fix RCE vulnerability with .rdoc_options in RDoc. Resolves: RHEL-34116 - Fix arbitrary memory address read vulnerability with Regex search. Resolves: RHEL-33866 * Fri Jan 26 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.0-4 - Do not set AI_ADDRCONFIG by default when calling getaddrinfo(3). * Mon Jan 22 2024 Fedora Release Engineering <releng@fedoraproject.org> - Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild