SECURITY:

fix an arbitrary command execution vulnerability; bump PKGNAME

http://www.vuxml.org/openbsd/e80d814e-e9b6-11d9-a5c1-00065bd5b0b6.html
This commit is contained in:
robert 2005-06-30 22:37:12 +00:00
parent 10da58b40b
commit c1791de453
2 changed files with 14 additions and 1 deletions

View File

@ -1,10 +1,11 @@
# $OpenBSD: Makefile,v 1.30 2005/02/24 13:20:41 alek Exp $
# $OpenBSD: Makefile,v 1.31 2005/06/30 22:37:12 robert Exp $
COMMENT= "object oriented script language with threads"
SHARED_ONLY= Yes
VERSION= 1.8.1
DISTNAME= ruby-${VERSION}
PKGNAME= ${DISTNAME}p0
CATEGORIES= lang
HOMEPAGE= http://www.ruby-lang.org/

View File

@ -0,0 +1,12 @@
$OpenBSD: patch-lib_xmlrpc_utils_rb,v 1.1 2005/06/30 22:37:12 robert Exp $
--- lib/xmlrpc/utils.rb.orig Fri Jul 1 00:20:34 2005
+++ lib/xmlrpc/utils.rb Fri Jul 1 00:21:26 2005
@@ -138,7 +138,7 @@
def get_methods(obj, delim=".")
prefix = @prefix + delim
- obj.class.public_instance_methods.collect { |name|
+ obj.class.public_instance_methods(false).collect { |name|
[prefix + name, obj.method(name).to_proc, nil, nil]
}
end