Bug 1280296 - Rebase to the latest Ruby 2.2 point release
Rebase to the latest Ruby 2.2 point release
Product: Red Hat Software Collections
Classification: Red Hat
Component: ruby (Show other bugs)
Unspecified Unspecified
unspecified Severity unspecified
: ---
: 3.1
Assigned To: Pavel Valena
BaseOS QE - Apps
: FutureFeature, Rebase
Depends On:
Blocks: 1432980 1549646
  Show dependency treegraph
Reported: 2015-11-11 07:32 EST by Vít Ondruch
Modified: 2018-03-15 14:40 EDT (History)
8 users (show)

See Also:
Fixed In Version:
Doc Type: Rebase: Bug Fixes and Enhancements
Doc Text:
Rebase package(s) to version: 2.2.9 Highlights, important fixes, or notable enhancements: Upgrade to rubygems Upgrade to psych Upgrade to json
Story Points: ---
Clone Of:
: 1395796 1549646 (view as bug list)
Last Closed:
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Vít Ondruch 2015-11-11 07:32:55 EST
New Ruby 2.2 release is available. We should consider rebase.

Comment 1 Scott Merrill 2016-03-14 10:12:37 EDT
I'd like to see this rebase occur, too.

Comment 3 Vít Ondruch 2016-05-02 09:16:16 EDT
Please note that 2.2.5 is already released:

Comment 7 Vít Ondruch 2017-03-29 04:01:03 EDT

This is the last regular maintenance release of Ruby 2.2. After this, only security releases will be provided for one additional year.
Comment 11 Pavel Valena 2017-09-15 12:31:20 EDT
Latest Ruby 2.2 release:

Contains fixes for:
 - Bug CVE-2017-0898: Buffer underrun vulnerability in Kernel.sprintf
 - Bug CVE-2017-10784: Escape sequence injection vulnerability in the Basic authentication of WEBrick
 - Bug CVE-2017-14033: Buffer underrun vulnerability in OpenSSL ASN1 decode
 - Bug CVE-2017-14064: Heap exposure in generating JSON
 - Multiple vulnerabilities in RubyGems
Comment 12 Vít Ondruch 2017-12-15 04:03:18 EST
Ruby 2.2.9 is now available:


Note You need to log in before you can comment on or make changes to this bug.