To view an individual PR, use:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=(Bug Id).
The following is a listing of current problems submitted by FreeBSD users,
which need special attention. These represent problem reports covering
all versions including experimental development code and ob
Hi,
not sure if I can help further, but if I understand correctly, yes - ruby
2.0. is/was default.
*pkg audit* (after forced upgrade)
ruby-2.0.0.645,1 is vulnerable:
Ruby -- OpenSSL Hostname Verification Vulnerability
CVE: CVE-2015-1855
WWW:
https://vuxml.FreeBSD.org/freebsd/d4379f59-3e9b-49eb-93
Hi,
Did you build your own ports where ruby 2.0 was default? I see the package name
here is ruby-2.0.0.645,1, not ruby20-2.0.0.645,1. The entries in vuxml look
like this:
3326 ruby20
3327 2.0.0.645,1
...
3330 ruby
3331 2.1.6,1
So I think maybe it's matching
Dear port maintainer,
The portscout new distfile checker has detected that one or more of your
ports appears to be out of date. Please take the opportunity to check
each of the ports listed below, and if possible and appropriate,
submit/commit an update. If any ports have already been updated, you
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=194491
Sunpoet Po-Chuan Hsieh changed:
What|Removed |Added
Resolution|--- |Overcome By Events