Date: Fri, 19 Oct 2018 05:49:04 +0000 From: bugzilla-noreply@freebsd.org To: ruby@FreeBSD.org Subject: [Bug 232435] lang/ruby24: Update to 2.4.5 (fixes CVE-2018-1639[56]) and etc Message-ID: <bug-232435-21402@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D232435 Bug ID: 232435 Summary: lang/ruby24: Update to 2.4.5 (fixes CVE-2018-1639[56]) and etc Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: ruby@FreeBSD.org Reporter: yasu@utahime.org Flags: maintainer-feedback?(ruby@FreeBSD.org) Assignee: ruby@FreeBSD.org Flags: merge-quarterly? Created attachment 198349 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D198349&action= =3Dedit patch file * Update to 2.4.5. It fixes following vulnerabilities. - CVE-2018-16395 - CVE-2018-16396 * To fix portlint warnings, - Move USERS upward. - Regenerate patch by 'make makepatch'. * Stop using obsolete MLINKS and do what is really expected. - When this port is default ruby version, create symlinks=20 ${MANPREFIX}/man/man1/{erb,irb,ri,rub}.1.gz that point to=20 {erb,irb,ri,rub}24.1.gz. * Sort INSTALLED_SCRIPTS. Bug #232427 adds entry to VuXML that describe vulnerabilities fixed with th= is version. So please commit it together. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-232435-21402>