--- - branch: pkgsrc-2012Q4 date: Tue Feb 12 17:40:15 UTC 2013 files: - new: 1.6.10.1 old: '1.6' path: pkgsrc/devel/ruby-rdoc/PLIST pathrev: pkgsrc/devel/ruby-rdoc/PLIST@1.6.10.1 type: modified - new: 1.8.10.1 old: '1.8' path: pkgsrc/devel/ruby-rdoc/distinfo pathrev: pkgsrc/devel/ruby-rdoc/distinfo@1.8.10.1 type: modified - new: 1.11.4.1 old: '1.11' path: pkgsrc/lang/ruby/rdoc.mk pathrev: pkgsrc/lang/ruby/rdoc.mk@1.11.4.1 type: modified id: 20130212T174015Z.010b34279580b8e146424e010def842b1b026978 log: "Pullup ticket #4057 - requested by taca\ndevel/ruby-rdoc: security update\n\nRevisions pulled up:\n- devel/ruby-rdoc/PLIST 1.7\n- devel/ruby-rdoc/distinfo 1.9\n- lang/ruby/rdoc.mk \ 1.12\n\n---\n Module Name:\tpkgsrc\n \ Committed By:\ttaca\n Date:\t\tWed Feb 6 15:53:15 UTC 2013\n\n Modified Files:\n \tpkgsrc/devel/ruby-rdoc: PLIST distinfo\n \tpkgsrc/lang/ruby: rdoc.mk\n\n \ Log Message:\n Update ruby-rdoc to 3.12.1.\n\n === 3.12.1 / 2013-02-05\n\n \ * Bug fixes\n * Fixed an XSS exploit in darkfish.js. This could lead to cookie disclosure\n to third parties. See CVE-2013-0256[rdoc-ref:CVE-2013-0256.rdoc] for full\n details including a patch you can apply to generated RDoc documentation.\n \ * Ensured that rd parser files are generated before checking the manifest.\n" module: pkgsrc subject: 'CVS commit: [pkgsrc-2012Q4] pkgsrc' unixtime: '1360690815' user: tron