Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 29 Jul 2006 19:40:02 +0200
From:      Remko Lodder <remko@FreeBSD.org>
To:        Sergey Matveychuk <sem@FreeBSD.org>
Cc:        cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org
Subject:   Re: cvs commit: ports/security/vuxml vuln.xml
Message-ID:  <44CB9D72.20005@FreeBSD.org>
In-Reply-To: <44CB9972.1010505@FreeBSD.org>
References:  <200607291654.k6TGsY1C024356@repoman.freebsd.org> <44CB9972.1010505@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Sergey Matveychuk wrote:
> Remko Lodder wrote:
>> remko       2006-07-29 16:54:34 UTC
>>
>>   FreeBSD ports repository (doc committer)
>>
>>   Modified files:
>>     security/vuxml       vuln.xml 
>>   Log:
>>   Add a BID to the latest vuxml entry.
>>   Some minor changes to the markup of the entry.
>>   
>>   Revision  Changes    Path
>>   1.1088    +17 -29    ports/security/vuxml/vuln.xml
> 
> I think a correct ruby18* ports version is 1.8.4_8,1.
> 

If I understand this correctly; you are talking about the
vulnerable versions? I will be marking all 1.6 and 1.8
versions as vulnerable till the patches had been applied
to our ports tree.  I do not think it is safe to assume
that some versions are not vulnerable while all sources
mention it is only available in CVS.  I will update the
entry when the patches are there and we can exactly
determine what version is not vulnerable.

Thanks for the trigger Sergey!

-- 
Kind regards,

      Remko Lodder               ** remko@elvandar.org
      FreeBSD                    ** remko@FreeBSD.org

      /* Quis custodiet ipsos custodes */



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44CB9D72.20005>