Path to this page:
Subject: CVS commit: pkgsrc/security/ruby-metasploit-payloads
From: Takahiro Kambe
Date: 2021-12-11 14:46:20
Message id: 20211211134620.C1AE6FAEC@cvs.NetBSD.org
Log Message:
security/ruby-metasploit-payloads: update to 2.0.66
2.0.61 (2021-11-29)
* Land #510, honour the pty flag
2.0.62 (2021-12-07)
* resolve_host should return NULL on failure
* Land #513, fix php stdapi loading on php 5.3.29
2.0.63 (2021-12-08)
* Land #514, fix python exception when closing channels
2.0.64 (2021-12-08)
* Fix #512, fix python cmd_exec argument list during
PROCESS_EXECUTE_FLAG_SUBSHELL
* Land #515, Fix #512, fix python cmd_exec argv
2.0.65 (2021-12-08)
* Return an empty stat buf when stat fails
* Land #511, fix stderr output in python channels
2.0.66 (2021-12-09)
* Land #516, fix python stat on inaccessible directory
* Land #517, fix php stat on inaccessible directory
Files: