[ All 3 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ]
×

Package rubygem-typeprof-0.21.9-10.el10_0.noarch download

Name rubygem-typeprof
Epoch 0
Version 0.21.9
Release 10.el10_0
Architecture noarch
Website/URL https://github.com/ruby/typeprof
License MIT
Build Time 2025-05-27 09:56:31
Build Host builder-x86-05.inferitos.ru
Summary TypeProf is a type analysis tool for Ruby code based on abstract interpretation
Repositories AppStream
Description TypeProf performs a type analysis of non-annotated Ruby code. It abstractly executes input Ruby code in a level of types instead of values, gathers what types are passed to and returned by methods, and prints the analysis result in RBS format, a standard type description format for Ruby 3.0.
Errata INFSA-2025:8131
Size 80 KiB
Source Project ruby-3.3.8-10.el10_0
SHA-256 checksum fe0639282f1d25e9d91e050beba7dd6966a433c8fc77ee055fb834a6454a4c24
× Full screenshot
Changelog link
* Tue May 27 2025 MSVSphere Packaging Team <packager@msvsphere-os.ru> - None:3.3.8-10
- Rebuilt for MSVSphere 10

* Mon Apr 14 2025 Jarek Prokop <jprokop@redhat.com> - 3.3.8-10
- Upgrade to Ruby 3.3.8.
  Resolves: RHEL-87342
- Fix Net::IMAP vulnerable to possible DoS by memory exhaustion. (CVE-2025-25186)
- Fix Denial of Service in CGI::Cookie.parse. (CVE-2025-27219)
  Resolves: RHEL-86116
- Fix userinfo leakage in URI#join, URI#merge and URI#+. (CVE-2025-27221)

* Thu Jan 30 2025 Jun Aruga <jaruga@redhat.com> - 3.3.7-9
- Upgrade to Ruby 3.3.7
  Resolves: RHEL-77994
- Fix Ruby OpenSSL to respect crypto-policies TLS minimal version.
  Resolves: RHEL-21019

* Tue Oct 29 2024 Troy Dawson <tdawson@redhat.com>
- Bump release for October 2024 mass rebuild:
  Resolves: RHEL-64018

* Wed Sep 04 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.5-7
- Upgrade to Ruby 3.3.5
  Resolves: RHEL-59035
- Fix DoS vulnerability in rexml.
  (CVE-2024-39908)
  (CVE-2024-41946)
  (CVE-2024-43398)
  Resolves: RHEL-57047
  Resolves: RHEL-57059
  Resolves: RHEL-57070
- Fix REXML DoS when parsing an XML having many specific characters such as
  whitespace character, >] and ]>.
  (CVE-2024-41123)
  Resolves: RHEL-52802

* Mon Jun 24 2024 Troy Dawson <tdawson@redhat.com>
- Bump release for June 2024 mass rebuild

* Thu May 09 2024 Jun Aruga <jaruga@redhat.com> - 3.3.1-5
- Upgrade to Ruby 3.3.1.
  Resolves: RHEL-33975
- Fix buffer overread vulnerability in StringIO.
  Resolves: RHEL-34124
- Fix RCE vulnerability with .rdoc_options in RDoc.
  Resolves: RHEL-34116
- Fix arbitrary memory address read vulnerability with Regex search.
  Resolves: RHEL-33866

* Fri Jan 26 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.0-4
- Do not set AI_ADDRCONFIG by default when calling getaddrinfo(3).

* Mon Jan 22 2024 Fedora Release Engineering <releng@fedoraproject.org>
- Rebuilt for https://fedoraproject.org/wiki/Fedora_40_Mass_Rebuild

* Mon Jan 15 2024 Jarek Prokop <jprokop@redhat.com> - 3.3.0-2
- Fix compiling coroutines with aarch64's branch protection.