Date: Sat, 29 Jul 2006 19:40:02 +0200 From: Remko Lodder <remko@FreeBSD.org> To: Sergey Matveychuk <sem@FreeBSD.org> Cc: cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org Subject: Re: cvs commit: ports/security/vuxml vuln.xml Message-ID: <44CB9D72.20005@FreeBSD.org> In-Reply-To: <44CB9972.1010505@FreeBSD.org> References: <200607291654.k6TGsY1C024356@repoman.freebsd.org> <44CB9972.1010505@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Sergey Matveychuk wrote:
> Remko Lodder wrote:
>> remko 2006-07-29 16:54:34 UTC
>>
>> FreeBSD ports repository (doc committer)
>>
>> Modified files:
>> security/vuxml vuln.xml
>> Log:
>> Add a BID to the latest vuxml entry.
>> Some minor changes to the markup of the entry.
>>
>> Revision Changes Path
>> 1.1088 +17 -29 ports/security/vuxml/vuln.xml
>
> I think a correct ruby18* ports version is 1.8.4_8,1.
>
If I understand this correctly; you are talking about the
vulnerable versions? I will be marking all 1.6 and 1.8
versions as vulnerable till the patches had been applied
to our ports tree. I do not think it is safe to assume
that some versions are not vulnerable while all sources
mention it is only available in CVS. I will update the
entry when the patches are there and we can exactly
determine what version is not vulnerable.
Thanks for the trigger Sergey!
--
Kind regards,
Remko Lodder ** remko@elvandar.org
FreeBSD ** remko@FreeBSD.org
/* Quis custodiet ipsos custodes */
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44CB9D72.20005>
