Received: from mail.netbsd.org (mail.netbsd.org [199.233.217.200]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) (Client CN "mail.NetBSD.org", Issuer "mail.NetBSD.org CA" (not verified)) by mollari.NetBSD.org (Postfix) with ESMTPS id E2A2D1A923A for ; Sat, 11 Dec 2021 13:46:22 +0000 (UTC) Received: by mail.netbsd.org (Postfix, from userid 605) id 229B984EF2; Sat, 11 Dec 2021 13:46:22 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by mail.netbsd.org (Postfix) with ESMTP id 5C04684E76 for ; Sat, 11 Dec 2021 13:46:21 +0000 (UTC) X-Virus-Scanned: amavisd-new at netbsd.org Received: from mail.netbsd.org ([127.0.0.1]) by localhost (mail.netbsd.org [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id r4TYVQsmtCBo for ; Sat, 11 Dec 2021 13:46:20 +0000 (UTC) Received: from cvs.NetBSD.org (ivanova.NetBSD.org [IPv6:2001:470:a085:999:28c:faff:fe03:5984]) by mail.netbsd.org (Postfix) with ESMTP id C46A884C71 for ; Sat, 11 Dec 2021 13:46:20 +0000 (UTC) Received: by cvs.NetBSD.org (Postfix, from userid 500) id C1AE6FAEC; Sat, 11 Dec 2021 13:46:20 +0000 (UTC) Content-Transfer-Encoding: 7bit Content-Type: multipart/mixed; boundary="_----------=_1639230380137320" MIME-Version: 1.0 Date: Sat, 11 Dec 2021 13:46:20 +0000 From: "Takahiro Kambe" Subject: CVS commit: pkgsrc/security/ruby-metasploit-payloads To: pkgsrc-changes@NetBSD.org Reply-To: taca@netbsd.org X-Mailer: log_accum Message-Id: <20211211134620.C1AE6FAEC@cvs.NetBSD.org> Sender: pkgsrc-changes-owner@NetBSD.org List-Id: Precedence: bulk List-Unsubscribe: This is a multi-part message in MIME format. --_----------=_1639230380137320 Content-Disposition: inline Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset="US-ASCII" Module Name: pkgsrc Committed By: taca Date: Sat Dec 11 13:46:20 UTC 2021 Modified Files: pkgsrc/security/ruby-metasploit-payloads: Makefile distinfo Log Message: security/ruby-metasploit-payloads: update to 2.0.66 2.0.61 (2021-11-29) * Land #510, honour the pty flag 2.0.62 (2021-12-07) * resolve_host should return NULL on failure * Land #513, fix php stdapi loading on php 5.3.29 2.0.63 (2021-12-08) * Land #514, fix python exception when closing channels 2.0.64 (2021-12-08) * Fix #512, fix python cmd_exec argument list during PROCESS_EXECUTE_FLAG_SUBSHELL * Land #515, Fix #512, fix python cmd_exec argv 2.0.65 (2021-12-08) * Return an empty stat buf when stat fails * Land #511, fix stderr output in python channels 2.0.66 (2021-12-09) * Land #516, fix python stat on inaccessible directory * Land #517, fix php stat on inaccessible directory To generate a diff of this commit: cvs rdiff -u -r1.21 -r1.22 pkgsrc/security/ruby-metasploit-payloads/Makefile cvs rdiff -u -r1.19 -r1.20 pkgsrc/security/ruby-metasploit-payloads/distinfo Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files. --_----------=_1639230380137320 Content-Disposition: inline Content-Length: 1769 Content-Transfer-Encoding: binary Content-Type: text/x-diff; charset=us-ascii Modified files: Index: pkgsrc/security/ruby-metasploit-payloads/Makefile diff -u pkgsrc/security/ruby-metasploit-payloads/Makefile:1.21 pkgsrc/security/ruby-metasploit-payloads/Makefile:1.22 --- pkgsrc/security/ruby-metasploit-payloads/Makefile:1.21 Sun Nov 28 14:01:35 2021 +++ pkgsrc/security/ruby-metasploit-payloads/Makefile Sat Dec 11 13:46:20 2021 @@ -1,6 +1,6 @@ -# $NetBSD: Makefile,v 1.21 2021/11/28 14:01:35 taca Exp $ +# $NetBSD: Makefile,v 1.22 2021/12/11 13:46:20 taca Exp $ -DISTNAME= metasploit-payloads-2.0.60 +DISTNAME= metasploit-payloads-2.0.66 CATEGORIES= security MAINTAINER= minskim@NetBSD.org Index: pkgsrc/security/ruby-metasploit-payloads/distinfo diff -u pkgsrc/security/ruby-metasploit-payloads/distinfo:1.19 pkgsrc/security/ruby-metasploit-payloads/distinfo:1.20 --- pkgsrc/security/ruby-metasploit-payloads/distinfo:1.19 Sun Nov 28 14:01:35 2021 +++ pkgsrc/security/ruby-metasploit-payloads/distinfo Sat Dec 11 13:46:20 2021 @@ -1,5 +1,5 @@ -$NetBSD: distinfo,v 1.19 2021/11/28 14:01:35 taca Exp $ +$NetBSD: distinfo,v 1.20 2021/12/11 13:46:20 taca Exp $ -BLAKE2s (metasploit-payloads-2.0.60.gem) = b9f027a8baaab16e402d80a889fcaaa6726aefb209482935ca2b33b4148ed272 -SHA512 (metasploit-payloads-2.0.60.gem) = 8eae686a58bda1790f30897e275d416cc3cf3e7f83483783997e71b896bd3f0adb76a9b174e60dc3790d5960928d4e06efbde099ffb563074dd47d8ce14573a0 -Size (metasploit-payloads-2.0.60.gem) = 12537344 bytes +BLAKE2s (metasploit-payloads-2.0.66.gem) = 210f90c75e0f0061063713b57bdbfdd9acd73fb17c9f731d6a2ba698c3d67f3d +SHA512 (metasploit-payloads-2.0.66.gem) = 880ccb67050fce2883696ec69191d072ab66f1117ba71904aa80ec0d22d7daaa88258de0bc49f7bacaf995b97cb6948aa769270f759ebc5442542cc34f6d45ca +Size (metasploit-payloads-2.0.66.gem) = 12537344 bytes --_----------=_1639230380137320--