Date: Sat, 29 Jul 2006 19:40:02 +0200 From: Remko Lodder <remko@FreeBSD.org> To: Sergey Matveychuk <sem@FreeBSD.org> Cc: cvs-ports@FreeBSD.org, cvs-all@FreeBSD.org, ports-committers@FreeBSD.org Subject: Re: cvs commit: ports/security/vuxml vuln.xml Message-ID: <44CB9D72.20005@FreeBSD.org> In-Reply-To: <44CB9972.1010505@FreeBSD.org> References: <200607291654.k6TGsY1C024356@repoman.freebsd.org> <44CB9972.1010505@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Sergey Matveychuk wrote: > Remko Lodder wrote: >> remko 2006-07-29 16:54:34 UTC >> >> FreeBSD ports repository (doc committer) >> >> Modified files: >> security/vuxml vuln.xml >> Log: >> Add a BID to the latest vuxml entry. >> Some minor changes to the markup of the entry. >> >> Revision Changes Path >> 1.1088 +17 -29 ports/security/vuxml/vuln.xml > > I think a correct ruby18* ports version is 1.8.4_8,1. > If I understand this correctly; you are talking about the vulnerable versions? I will be marking all 1.6 and 1.8 versions as vulnerable till the patches had been applied to our ports tree. I do not think it is safe to assume that some versions are not vulnerable while all sources mention it is only available in CVS. I will update the entry when the patches are there and we can exactly determine what version is not vulnerable. Thanks for the trigger Sergey! -- Kind regards, Remko Lodder ** remko@elvandar.org FreeBSD ** remko@FreeBSD.org /* Quis custodiet ipsos custodes */
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44CB9D72.20005>