2023-01-25 14:31:17 by Takahiro Kambe | Files touched by this commit (14) | |
Log message:
www/ruby-rails70: update to 7.0.4.2
Rails 7.0.4.2 (2023-01-24)
* Fix `domain: :all` for two letter TLD
This fixes a compatibility issue introduced in our previous security
release when using `domain: :all` with a two letter but single level top
level domain domain (like `.ca`, rather than `.co.uk`).
|
2023-01-19 15:34:27 by Takahiro Kambe | Files touched by this commit (15) | |
Log message:
www/ruby-rails70: update to 7.0.4.1
Rails 7.0.4.1 (2023-01-17)
devel/ruby-activesupport70
* Avoid regex backtracking in Inflector.underscore
[CVE-2023-22796]
www/ruby-actionpack70
* Fix sec issue with _url_host_allowed?
Disallow certain strings from `_url_host_allowed?` to avoid a redirect
to malicious sites.
[CVE-2023-22797]
* Avoid regex backtracking on If-None-Match header
[CVE-2023-22795]
* Use string#split instead of regex for domain parts
[CVE-2023-22792]
databases/ruby-activerecord70
* Make sanitize_as_sql_comment more strict
Though this method was likely never meant to take user input, it was
attempting sanitization. That sanitization could be bypassed with
carefully crafted input.
This commit makes the sanitization more robust by replacing any
occurrances of "/*" or "*/" with "/ *" or \
"* /". It also performs a
first pass to remove one surrounding comment to avoid compatibility
issues for users relying on the existing removal.
This also clarifies in the documentation of annotate that it should not
be provided user input.
[CVE-2023-22794]
* Added integer width check to PostgreSQL::Quoting
Given a value outside the range for a 64bit signed integer type
PostgreSQL will treat the column type as numeric. Comparing
integer values against numeric values can result in a slow
sequential scan.
This behavior is configurable via
ActiveRecord::Base.raise_int_wider_than_64bit which defaults to true.
[CVE-2022-44566]
|
2022-10-10 05:36:51 by Takahiro Kambe | Files touched by this commit (32) |
Log message:
Remove lines for Ruby 2.6.
|
2022-09-10 14:41:51 by Takahiro Kambe | Files touched by this commit (1) | |
Log message:
devel/ruby-activesupport70: update to 7.0.4
7.0.4 (2022-09-09)
* Redis cache store is now compatible with redis-rb 5.0.
Jean Boussier
* Fix NoMethodError on custom ActiveSupport::Deprecation behavior.
ActiveSupport::Deprecation.behavior= was supposed to accept any object
that responds to call, but in fact its internal implementation assumed
that this object could respond to arity, so it was restricted to only Proc
objects.
This change removes this arity restriction of custom behaviors.
Ryo Nakamura
|
2022-07-13 16:48:48 by Takahiro Kambe | Files touched by this commit (15) | |
Log message:
www/ruby-rails70: update to 7.0.3.1
Rails 7.0.3.1 (2022-07-12) updates databases/ruby-activerecord70 only.
databases/ruby-activerecord70
* Change ActiveRecord::Coders::YAMLColumn default to safe_load
This adds two new configuration options The configuration options are as
follows:
o config.active_storage.use_yaml_unsafe_load
When set to true, this configuration option tells Rails to use the old
"unsafe" YAML loading strategy, maintaining the existing behavior but
leaving the possible escalation vulnerability in place. Setting this
option to true is *not* recommended, but can aid in upgrading.
o config.active_record.yaml_column_permitted_classes
The "safe YAML" loading method does not allow all classes to be
deserialized by default. This option allows you to specify classes deemed
"safe" in your application. For example, if your application uses Symbol
and Time in serialized data, you can add Symbol and Time to the allowed
list as follows:
config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time]
[CVE-2022-32224]
|
2022-06-07 17:15:29 by Takahiro Kambe | Files touched by this commit (1) | |
Log message:
devel/ruby-activesupport70: update to 7.0.3
7.0.3 (2022-05-12)
* No change except version.
|
2022-05-05 05:39:53 by Takahiro Kambe | Files touched by this commit (1) | |
Log message:
devel/ruby-activesupport70: update to 7.0.2.4
## Rails 7.0.2.4 (April 26, 2022) ##
* Fix and add protections for XSS in `ActionView::Helpers` and `ERB::Util`.
Add the method `ERB::Util.xml_name_escape` to escape dangerous characters
in names of tags and names of attributes, following the specification of XML.
*Álvaro Martín Fraguas*
|
2022-03-27 08:43:12 by Thomas Klausner | Files touched by this commit (13) |
Log message:
rails 7.0 wants ruby 2.7+, mark it as such
|
2022-03-27 08:31:56 by Thomas Klausner | Files touched by this commit (4) |
Log message:
*: fix typo in comment
|
2022-03-27 08:30:00 by Thomas Klausner | Files touched by this commit (24) |
Log message:
ruby*: fix rails version in COMMENT
|