summaryrefslogtreecommitdiff
path: root/lang/ruby
diff options
context:
space:
mode:
authortaca <taca>2013-02-22 16:20:47 +0000
committertaca <taca>2013-02-22 16:20:47 +0000
commit02f7fcf7c8bcfd74175f6abeffe32f12903fe0b7 (patch)
tree46ef34621aef0a46ff152d5182b39ffc9176ad80 /lang/ruby
parentaa7fa222868d079cca6a308c1ab896a54f133160 (diff)
downloadpkgsrc-02f7fcf7c8bcfd74175f6abeffe32f12903fe0b7.tar.gz
Update ruby193-base package (and related) to 1.9.3-p392.
Security problem of CVE-2013-0269 was already handled but REXML security problem is fixed by this package. Now Ruby 1.9.3-p392 is released. I apologize for updating too frequently. This release includes security fixes about bundled JSON and REXML. * Denial of Service and Unsafe Object Creation Vulnerability in JSON (CVE-2013-0269) * Entity expansion DoS vulnerability in REXML (XML bomb) And some small bugfixes are also included.
Diffstat (limited to 'lang/ruby')
-rw-r--r--lang/ruby/rubyversion.mk4
1 files changed, 2 insertions, 2 deletions
diff --git a/lang/ruby/rubyversion.mk b/lang/ruby/rubyversion.mk
index 05518f26408..077aeba3d6c 100644
--- a/lang/ruby/rubyversion.mk
+++ b/lang/ruby/rubyversion.mk
@@ -1,4 +1,4 @@
-# $NetBSD: rubyversion.mk,v 1.94 2013/02/06 15:48:30 taca Exp $
+# $NetBSD: rubyversion.mk,v 1.95 2013/02/22 16:20:47 taca Exp $
#
# This file determines which Ruby version is used as a dependency for
@@ -206,7 +206,7 @@ RUBY193_VERSION= 1.9.3
# patch
RUBY18_PATCHLEVEL= pl371
-RUBY193_PATCHLEVEL= p385
+RUBY193_PATCHLEVEL= p392
# current API compatible version; used for version of shared library
RUBY18_API_VERSION= 1.8.7