Name: | rubygem-net-telnet |
---|---|
Version: | 0.1.1 |
Release: | 111.module+el8.9.0+90042+a65659a6 |
Architecture: | noarch |
Module: | ruby:2.5:8090020231030055642:b46abd14 |
Group: | Development/Libraries |
Size: | 40740 |
License: | (Ruby or BSD) and Public Domain and MIT and CC0 and zlib and UCD |
RPM: | rubygem-net-telnet-0.1.1-111.module+el8.9.0+90042+a65659a6.noarch.rpm |
Source RPM: | ruby-2.5.9-111.module+el8.9.0+90042+a65659a6.src.rpm |
Build Date: | Mon Oct 30 2023 |
Build Host: | build-ol8-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | http://ruby-lang.org/ |
Summary: | Provides telnet client functionality |
Description: | Provides telnet client functionality. This class also has, through delegation, all the methods of a socket object (by default, a TCPSocket, but can be set by the Proxy option to new()). This provides methods such as close() to end the session and sysread() to read data directly from the host, instead of via the waitfor() mechanism. Note that if you do use sysread() directly when in telnet mode, you should probably pass the output through preprocess() to extract telnet command sequences. |
- Fix HTTP response splitting in CGI. Resolves: CVE-2021-33621 - Fix Buffer overrun in String-to-Float conversion. Resolves: CVE-2022-28739 - Fix ReDoS vulnerability in URI. Resolves: CVE-2023-28755 - Fix ReDoS vulnerability in Time. Resolves: CVE-2023-28756
- Fix rdoc parsing of nil text tokens. Resolves: rhbz#2210326
- Fix FTBFS due to an incompatible load directive. - Fix a fiddle import test on an optimized glibc on Power 9. - Fix by adding length limit option for methods that parses date strings. Resolves: CVE-2021-41817 - CGI::Cookie.parse no longer decodes cookie names to prevent spoofing security prefixes in cookie names. Resolves: CVE-2021-41819
- Properly fix command injection vulnerability in Rdoc. Related: CVE-2021-31799
- Fix command injection vulnerability in RDoc. Resolves: CVE-2021-31799 - Fix StartTLS stripping vulnerability in Net::IMAP Resolves: CVE-2021-32066 - Fix FTP PASV command response can cause Net::FTP to connect to arbitrary host. Resolves: CVE-2021-31810
- Update to Ruby 2.5.9. * Remove Patch20: ruby-2.6.0-rdoc-6.0.1-fix-template-typo.patch; subsumed Resolves: rhbz#1757844 - Resolv::DNS: timeouts if multiple IPv6 name servers are given and address contains leading zero Resolves: rhbz#1950308
- Remove file with non-commercial license from did_you_mean gem. Resolves: rhbz#1846113
- Use ffi_closure_alloc to avoid segmentation fault by libffi on aarch64. Resolves: rhbz#1727832 - Properly support %prerelease in %gemspec_ macros. Related: rhbz#1688758 - Fix rdoc gzipped javascript pages are not the same across multilib. Resolves: rhbz#1719647
- Update to Ruby 2.5.5. * Remove Patch25: ruby-2.6.0-Update-for-tzdata-2018f.patch; subsumed * Remove Patch11: ruby-2.6.0-Try-to-update-cert.patch; subsumed * Remove Patch19: ruby-2.6.0-net-http-net-ftp-fix-session-resumption-with -TLS-1.3.patch; subsumed Resolves: rhbz#1688758 - Don't ship .stp files when SystemTap support is disabled. Related: rhbz#1657915 - Fix CovScan issues. Resolves: rhbz#1628592
- Refresh expired certificates to fix FTBFS.