2023-03-15 14:35:17 by Takahiro Kambe | Files touched by this commit (15) | |
Log message:
www/ruby-rails70: update to 7.0.4.3
7.0.4.3 (2023-03-13)
Active Support
* Implement SafeBuffer#bytesplice
[CVE-2023-28120]
Action View
* Ignore certain data-* attributes in rails-ujs when element is
contenteditable
[CVE-2023-23913]
|
2023-01-25 14:31:17 by Takahiro Kambe | Files touched by this commit (14) | |
Log message:
www/ruby-rails70: update to 7.0.4.2
Rails 7.0.4.2 (2023-01-24)
* Fix `domain: :all` for two letter TLD
This fixes a compatibility issue introduced in our previous security
release when using `domain: :all` with a two letter but single level top
level domain domain (like `.ca`, rather than `.co.uk`).
|
2023-01-19 15:34:27 by Takahiro Kambe | Files touched by this commit (15) | |
Log message:
www/ruby-rails70: update to 7.0.4.1
Rails 7.0.4.1 (2023-01-17)
devel/ruby-activesupport70
* Avoid regex backtracking in Inflector.underscore
[CVE-2023-22796]
www/ruby-actionpack70
* Fix sec issue with _url_host_allowed?
Disallow certain strings from `_url_host_allowed?` to avoid a redirect
to malicious sites.
[CVE-2023-22797]
* Avoid regex backtracking on If-None-Match header
[CVE-2023-22795]
* Use string#split instead of regex for domain parts
[CVE-2023-22792]
databases/ruby-activerecord70
* Make sanitize_as_sql_comment more strict
Though this method was likely never meant to take user input, it was
attempting sanitization. That sanitization could be bypassed with
carefully crafted input.
This commit makes the sanitization more robust by replacing any
occurrances of "/*" or "*/" with "/ *" or \
"* /". It also performs a
first pass to remove one surrounding comment to avoid compatibility
issues for users relying on the existing removal.
This also clarifies in the documentation of annotate that it should not
be provided user input.
[CVE-2023-22794]
* Added integer width check to PostgreSQL::Quoting
Given a value outside the range for a 64bit signed integer type
PostgreSQL will treat the column type as numeric. Comparing
integer values against numeric values can result in a slow
sequential scan.
This behavior is configurable via
ActiveRecord::Base.raise_int_wider_than_64bit which defaults to true.
[CVE-2022-44566]
|
2022-10-10 05:36:51 by Takahiro Kambe | Files touched by this commit (32) |
Log message:
Remove lines for Ruby 2.6.
|
2022-09-10 14:47:02 by Takahiro Kambe | Files touched by this commit (1) | |
Log message:
mail/ruby-actionmailbox70: update to 7.0.4
No change except version.
|
2022-07-13 16:48:48 by Takahiro Kambe | Files touched by this commit (15) | |
Log message:
www/ruby-rails70: update to 7.0.3.1
Rails 7.0.3.1 (2022-07-12) updates databases/ruby-activerecord70 only.
databases/ruby-activerecord70
* Change ActiveRecord::Coders::YAMLColumn default to safe_load
This adds two new configuration options The configuration options are as
follows:
o config.active_storage.use_yaml_unsafe_load
When set to true, this configuration option tells Rails to use the old
"unsafe" YAML loading strategy, maintaining the existing behavior but
leaving the possible escalation vulnerability in place. Setting this
option to true is *not* recommended, but can aid in upgrading.
o config.active_record.yaml_column_permitted_classes
The "safe YAML" loading method does not allow all classes to be
deserialized by default. This option allows you to specify classes deemed
"safe" in your application. For example, if your application uses Symbol
and Time in serialized data, you can add Symbol and Time to the allowed
list as follows:
config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time]
[CVE-2022-32224]
|
2022-06-07 17:21:08 by Takahiro Kambe | Files touched by this commit (1) | |
Log message:
mail/ruby-actionmailbox70: update to 7.0.3
7.0.3 (2022-05-12)
* No change except version.
|
2022-05-05 05:41:42 by Takahiro Kambe | Files touched by this commit (11) |
Log message:
Update rest of Ruby on Rails 70 components.
No change except version.
|
2022-03-27 08:43:12 by Thomas Klausner | Files touched by this commit (13) |
Log message:
rails 7.0 wants ruby 2.7+, mark it as such
|
2022-03-27 08:30:00 by Thomas Klausner | Files touched by this commit (24) |
Log message:
ruby*: fix rails version in COMMENT
|