Package rubygem-bigdecimal-2.0.0-139.inferit.module+el8.9.0+86+ca84f634.x86_64
Name | rubygem-bigdecimal |
---|---|
Epoch | 0 |
Version | 2.0.0 |
Release | 139.inferit.module+el8.9.0+86+ca84f634 |
Architecture | x86_64 |
Website/URL | http://ruby-lang.org/ |
License | Ruby or BSD |
Build Time | 2024-04-18 16:49:28 |
Build Host | builder-x86-05.inferitos.ru |
Summary | BigDecimal provides arbitrary-precision floating point decimal arithmetic |
Repositories | AppStream |
Description | Ruby provides built-in support for arbitrary precision integer arithmetic. For example: 42**13 -> 1265437718438866624512 BigDecimal provides similar support for very large or very accurate floating point numbers. Decimal arithmetic is also useful for general calculation, because it provides the correct answers people expect–whereas normal binary floating point arithmetic often introduces subtle errors because of the conversion between base 10 and base 2. |
Errata | — |
Size | 102 KiB |
Source Project | ruby-2.7.8-139.inferit.module+el8.9.0+86+ca84f634 |
SHA-256 checksum | 4e6c58e8acde1c1c43235c6da465142460d8c3d562c1d48e4e08852ff5e040e8 |
×
* Wed Apr 17 2024 Arkady L. Shane <tigro@msvsphere-os.ru> - 2.7.8-139.inferit - Skip some SSL tests * Tue Dec 12 2023 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 2.7.8-139 - Rebuilt for MSVSphere 8.8 * Tue Apr 25 2023 Jarek Prokop <jprokop@redhat.com> - 2.7.8-139 - Upgrade to Ruby 2.7.8. Resolves: rhbz#2189465 - Fix HTTP response splitting in CGI. Resolves: CVE-2021-33621 - Fix ReDoS vulnerability in URI. Resolves: CVE-2023-28755 - Fix ReDoS vulnerability in Time. Resolves: CVE-2023-28756 * Tue Jul 19 2022 Jarek Prokop <jprokop@redhat.com> - 2.7.6-138 - Upgrade to Ruby 2.7.6. Resolves: rhbz#2096345 - Fix FTBFS due to an incompatible load directive. Related: rhbz#2096345 - Fix a fiddle import test on an optimized glibc on Power 9. Related: rhbz#2096345 - Fix regular Expression Denial of Service Vulnerability of Date Parsing Methods. Resolves: CVE-2021-41817 - Fix cookie prefix spoofing in CGI::Cookie.parse. Resolves: CVE-2021-41819 - Fix buffer overrun in String-to-Float conversion. Resolves: CVE-2022-28739 * Thu Jul 15 2021 Jun Aruga <jaruga@redhat.com> - 2.7.4-137 - Upgrade to Ruby 2.7.4. - Fix command injection vulnerability in RDoc. Resolves: CVE-2021-31799 - Fix FTP PASV command response can cause Net::FTP to connect to arbitrary host. Resolves: CVE-2021-31810 - Fix StartTLS stripping vulnerability in Net::IMAP. Resolves: CVE-2021-32066 - Upgrade to Bundler 2.2.24. Resolves: CVE-2020-36327 * Wed Apr 07 2021 Pavel Valena <pvalena@redhat.com> - 2.7.3-136 - Upgrade to Ruby 2.7.3. Resolves: rhbz#1947938 - Resolv::DNS: timeouts if multiple IPv6 name servers are given and address contains leading zero Resolves: rhbz#1944227 * Tue Oct 13 2020 Vít Ondruch <vondruch@redhat.com> - 2.7.2-135 - Upgrade to Ruby 2.7.2. - Avoid possible timeout errors in TestBugReporter#test_bug_reporter_add. * Fri Jun 26 2020 Vít Ondruch <vondruch@redhat.com> - 2.7.1-133 - Fix `require` behavior allowing to load libraries multiple times. Resolves: rhbz#1842989 - Add ruby-default-gems dependency on irb. * Fri Jun 26 2020 Jun Aruga <jaruga@redhat.com> - 2.7.1-133 - Ship racc binary. Resolves: rhbz#1851388 * Fri May 29 2020 Jun Aruga <jaruga@redhat.com> - 2.7.1-132 - Update to Ruby 2.7.1 by merging Fedora master branch (commit: 2981648) * Skip unstable tests on s390x. * Skip JIT tests in RHEL 8. Resolves: rhbz#1817135