Next | Query returned 24 messages, browsing 11 to 20 | Previous

History of commit frequency

CVS Commit History:


   2023-01-25 14:31:17 by Takahiro Kambe | Files touched by this commit (14) | Package updated
Log message:
www/ruby-rails70: update to 7.0.4.2

Rails 7.0.4.2 (2023-01-24)

*   Fix `domain: :all` for two letter TLD

    This fixes a compatibility issue introduced in our previous security
    release when using `domain: :all` with a two letter but single level top
    level domain domain (like `.ca`, rather than `.co.uk`).
   2023-01-19 15:34:27 by Takahiro Kambe | Files touched by this commit (15) | Package updated
Log message:
www/ruby-rails70: update to 7.0.4.1

Rails 7.0.4.1 (2023-01-17)

devel/ruby-activesupport70

* Avoid regex backtracking in Inflector.underscore

  [CVE-2023-22796]

www/ruby-actionpack70

* Fix sec issue with _url_host_allowed?

  Disallow certain strings from `_url_host_allowed?` to avoid a redirect
  to malicious sites.

  [CVE-2023-22797]

* Avoid regex backtracking on If-None-Match header

  [CVE-2023-22795]

* Use string#split instead of regex for domain parts

  [CVE-2023-22792]

databases/ruby-activerecord70

* Make sanitize_as_sql_comment more strict

  Though this method was likely never meant to take user input, it was
  attempting sanitization. That sanitization could be bypassed with
  carefully crafted input.

  This commit makes the sanitization more robust by replacing any
  occurrances of "/*" or "*/" with "/ *" or \ 
"* /". It also performs a
  first pass to remove one surrounding comment to avoid compatibility
  issues for users relying on the existing removal.

  This also clarifies in the documentation of annotate that it should not
  be provided user input.

  [CVE-2023-22794]

* Added integer width check to PostgreSQL::Quoting

  Given a value outside the range for a 64bit signed integer type
  PostgreSQL will treat the column type as numeric. Comparing
  integer values against numeric values can result in a slow
  sequential scan.

  This behavior is configurable via
  ActiveRecord::Base.raise_int_wider_than_64bit which defaults to true.

  [CVE-2022-44566]
   2022-10-10 05:36:51 by Takahiro Kambe | Files touched by this commit (32)
Log message:
Remove lines for Ruby 2.6.
   2022-09-10 14:41:51 by Takahiro Kambe | Files touched by this commit (1) | Package updated
Log message:
devel/ruby-activesupport70: update to 7.0.4

7.0.4 (2022-09-09)

* Redis cache store is now compatible with redis-rb 5.0.

  Jean Boussier

* Fix NoMethodError on custom ActiveSupport::Deprecation behavior.

  ActiveSupport::Deprecation.behavior= was supposed to accept any object
  that responds to call, but in fact its internal implementation assumed
  that this object could respond to arity, so it was restricted to only Proc
  objects.

  This change removes this arity restriction of custom behaviors.

  Ryo Nakamura
   2022-07-13 16:48:48 by Takahiro Kambe | Files touched by this commit (15) | Package updated
Log message:
www/ruby-rails70: update to 7.0.3.1

Rails 7.0.3.1 (2022-07-12) updates databases/ruby-activerecord70 only.

databases/ruby-activerecord70

* Change ActiveRecord::Coders::YAMLColumn default to safe_load

  This adds two new configuration options The configuration options are as
  follows:

	o config.active_storage.use_yaml_unsafe_load

  When set to true, this configuration option tells Rails to use the old
  "unsafe" YAML loading strategy, maintaining the existing behavior but
  leaving the possible escalation vulnerability in place.  Setting this
  option to true is *not* recommended, but can aid in upgrading.

	o config.active_record.yaml_column_permitted_classes

  The "safe YAML" loading method does not allow all classes to be
  deserialized by default.  This option allows you to specify classes deemed
  "safe" in your application.  For example, if your application uses Symbol
  and Time in serialized data, you can add Symbol and Time to the allowed
  list as follows:

	config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time]

  [CVE-2022-32224]
   2022-06-07 17:15:29 by Takahiro Kambe | Files touched by this commit (1) | Package updated
Log message:
devel/ruby-activesupport70: update to 7.0.3

7.0.3 (2022-05-12)

* No change except version.
   2022-05-05 05:39:53 by Takahiro Kambe | Files touched by this commit (1) | Package updated
Log message:
devel/ruby-activesupport70: update to 7.0.2.4

## Rails 7.0.2.4 (April 26, 2022) ##

*   Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.

    Add the method `ERB::Util.xml_name_escape` to escape dangerous characters
    in names of tags and names of attributes, following the specification of XML.

    *Álvaro Martín Fraguas*
   2022-03-27 08:43:12 by Thomas Klausner | Files touched by this commit (13)
Log message:
rails 7.0 wants ruby 2.7+, mark it as such
   2022-03-27 08:31:56 by Thomas Klausner | Files touched by this commit (4)
Log message:
*: fix typo in comment
   2022-03-27 08:30:00 by Thomas Klausner | Files touched by this commit (24)
Log message:
ruby*: fix rails version in COMMENT

Next | Query returned 24 messages, browsing 11 to 20 | Previous