--- - branch: pkgsrc-2021Q3 date: Sat Nov 27 22:02:59 UTC 2021 files: - new: 1.237.2.2 old: 1.237.2.1 path: pkgsrc/lang/ruby/rubyversion.mk pathrev: pkgsrc/lang/ruby/rubyversion.mk@1.237.2.2 type: modified - new: 1.4.4.1 old: '1.4' path: pkgsrc/lang/ruby27-base/PLIST pathrev: pkgsrc/lang/ruby27-base/PLIST@1.4.4.1 type: modified - new: 1.5.2.1 old: '1.5' path: pkgsrc/lang/ruby27-base/distinfo pathrev: pkgsrc/lang/ruby27-base/distinfo@1.5.2.1 type: modified id: 20211127T220259Z.5fbbc75db9c640e16a1c66abe38fcce49eebbc00 log: "Pullup ticket #6546 - requested by taca\nlang/ruby27-base: security fix\n\nRevisions pulled up:\n- lang/ruby/rubyversion.mk 1.239\n- lang/ruby27-base/PLIST 1.5\n- lang/ruby27-base/distinfo \ 1.9\n\n---\n Module Name:\tpkgsrc\n Committed By:\ttaca\n Date:\t\tThu Nov 25 16:01:18 UTC 2021\n\n Modified Files:\n \tpkgsrc/lang/ruby: rubyversion.mk\n \tpkgsrc/lang/ruby27-base: PLIST distinfo\n\n Log Message:\n \ lang/ruby27-base: update to 2.7.5\n\n Ruby 2.7.5 Released\n Posted by usa on 24 Nov 2021\n\n Ruby 2.7.5 has been released.\n\n This release includes security fixes. Please check the topics below for\n details.\n\n * CVE-2021-41817: Regular Expression Denial of Service Vulnerability of Date\n Parsing Methods\n\n \ * CVE-2021-41816: Buffer Overrun in CGI.escape_html\n\n * CVE-2021-41819: Cookie Prefix Spoofing in CGI::Cookie.parse\n\n See the commit logs for details.\n" module: pkgsrc subject: 'CVS commit: [pkgsrc-2021Q3] pkgsrc/lang' unixtime: '1638050579' user: tm