ruby2.5 - Interpreter of object-oriented scripting language Ruby

Property Value
Distribution Ubuntu 18.04 LTS (Bionic Beaver)
Repository Ubuntu Updates Main i386
Package filename ruby2.5_2.5.1-1ubuntu1.5_i386.deb
Package name ruby2.5
Package version 2.5.1
Package release 1ubuntu1.5
Package architecture i386
Package type deb
Category ruby
License -
Maintainer Ubuntu Developers <>
Download size 47.59 KB
Installed size 128.00 KB
Ruby is the interpreted scripting language for quick and easy
object-oriented programming.  It has many features to process text
files and to do system management tasks (as in perl).  It is simple,
straight-forward, and extensible.
In the name of this package, `2.5' indicates the Ruby library compatibility
version. This package currently provides the `2.5.x' branch of Ruby.


Package Version Architecture Repository
ruby2.5_2.5.1-1ubuntu1.5_amd64.deb 2.5.1 amd64 Ubuntu Updates Main
ruby2.5_2.5.1-1ubuntu1_i386.deb 2.5.1 i386 Ubuntu Main
ruby2.5_2.5.1-1ubuntu1_amd64.deb 2.5.1 amd64 Ubuntu Main
ruby2.5 - - -


Name Value
libc6 >= 2.1.3
libruby2.5 >= 2.5.0~preview1
rubygems-integration >= 1.8


Type URL
Binary Package ruby2.5_2.5.1-1ubuntu1.5_i386.deb
Source Package ruby2.5

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install ruby2.5 deb package:
    # sudo apt-get install ruby2.5




2019-07-25 - Bryce Harrington <>
ruby2.5 (2.5.1-1ubuntu1.5) bionic; urgency=medium
* Add d/p/restore_buffer_newline_check.patch to fix failure sending
files with mixed newline encoding styles; this regression was
introduced by 0009-openssl-sync-with-upstream-repository.patch.
(LP: #1835968)
2019-04-23 - Dimitri John Ledkov <>
ruby2.5 (2.5.1-1ubuntu1.4) bionic; urgency=medium
* Cherrypick ruby-openssl upstream commits to fix compat with OpenSSL
1.1.1 LP: #1797386
2019-04-01 - Leonidas S. Barbosa <>
ruby2.5 (2.5.1-1ubuntu1.2) bionic-security; urgency=medium
* SECURITY UPDATE: Delete directory using symlink when decompressing tar,
Escape sequence injection vulnerability in gem owner, Escape sequence
injection vulnerability in API response handling, Arbitrary code exec,
Escape sequence injection vulnerability in errors
- debian/patches/CVE-2019-8320-25.patch: fix in
- CVE-2019-8320
- CVE-2019-8321
- CVE-2019-8322
- CVE-2019-8323
- CVE-2019-8324
- CVE-2019-8325
* Fixing expired SSL certs
- debian/patches/fixing_expired_SSL_certs.patch: fix in
test/net/fixtures/cacert.pem, test/net/fixtures/server.crt,
2018-10-31 - Leonidas S. Barbosa <>
ruby2.5 (2.5.1-1ubuntu1.1) bionic-security; urgency=medium
* SECURITY UPDATE: Name equality check
- debian/patches/CVE-2018-16395.patch: fix in
- CVE-2018-16395
* SECURITY UPDATE: Tainted flags not propagted
- debian/patches/CVE-2018-16396.patch: fix in
pack.c, test/ruby/test_pack.rb.
- CVE-2018-16396
* Fixing tz tests for asia_tokyo test
- debian/patches/fixing_tz_asia_tokyo_test.patch
2018-04-02 - Matthias Klose <>
ruby2.5 (2.5.1-1ubuntu1) bionic; urgency=medium
* Merge with Debian; remaining changes:
- Mark some tests as failing on Launchpad.
- Update symbols file.
2018-03-31 - Antonio Terceiro <>
ruby2.5 (2.5.1-1) unstable; urgency=medium
* New upstream version 2.5.1.
According to the release announcement, includes fixes for the following
security issues:
- CVE-2017-17742: HTTP response splitting in WEBrick
- CVE-2018-6914: Unintentional file and directory creation with directory
traversal in tempfile and tmpdir
- CVE-2018-8777: DoS by large request in WEBrick
- CVE-2018-8778: Buffer under-read in String#unpack
- CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in
UNIXServer and UNIXSocket
- CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in
- Multiple vulnerabilities in RubyGems
* Refresh patches.
Patches dropped for being already applied upstream:
- 0005-Fix-tests-to-cope-with-updates-in-tzdata.patch
- 0006-Rubygems-apply-upstream-patch-to-fix-multiple-vulner.patch
* Add patch to fix FTBFS on ia64 (Closes: #889848)
* Add simple autopkgtest to check for builtin extensions that are build
against external dependencies (ssl, yaml, *dbm etc)
* Add build-dependency on libgdbm-compat-dev (Closes: #892099)
* debian/tests/excludes/any/TestTimeTZ.rb: ignore tests failing due to
assumptions that don't hold on newer tzdata update. Upstream bug:
* debian/libruby2.5.symbols: update with new symbol added in this release
2018-03-05 - Gianfranco Costamagna <>
ruby2.5 (2.5.0-6ubuntu1) bionic; urgency=low
* Merge from Debian unstable.  Remaining changes:
- Mark some tests as failing on Launchpad.
- Update symbols file.

See Also

Package Description
sa-compile_3.4.2-0ubuntu0.18.04.1_all.deb Tools for compiling SpamAssassin rules into C
samba-common-bin_4.7.6+dfsg~ubuntu-0ubuntu2.11_i386.deb Samba common files used by both the server and the client
samba-common_4.7.6+dfsg~ubuntu-0ubuntu2.11_all.deb common files used by both the Samba server and client
samba-dev_4.7.6+dfsg~ubuntu-0ubuntu2.11_i386.deb tools for extending Samba
samba-dsdb-modules_4.7.6+dfsg~ubuntu-0ubuntu2.11_i386.deb Samba Directory Services Database
samba-libs_4.7.6+dfsg~ubuntu-0ubuntu2.11_i386.deb Samba core libraries
samba-vfs-modules_4.7.6+dfsg~ubuntu-0ubuntu2.11_i386.deb Samba Virtual FileSystem plugins
samba_4.7.6+dfsg~ubuntu-0ubuntu2.11_i386.deb SMB/CIFS file, print, and login server for Unix
sane-utils_1.0.27-1~experimental3ubuntu2.2_i386.deb API library for scanners -- utilities
screen_4.6.2-1ubuntu1_i386.deb terminal multiplexer with VT100/ANSI terminal emulation
seccomp_2.4.1-0ubuntu0.18.04.2_i386.deb helper tools for high level interface to Linux seccomp filter
secureboot-db_1.4~ubuntu0.18.04.1_i386.deb Secure Boot updates for DB and DBX
shotwell-common_0.28.4-0ubuntu1_all.deb digital photo organizer - common files
shotwell_0.28.4-0ubuntu1_i386.deb digital photo organizer
slapd_2.4.45+dfsg-1ubuntu1.4_i386.deb OpenLDAP server (slapd)