Update ruby-activemodel to 3.0.20.
Fix CVE-2013-0333. There is a vulnerability in the JSON code for Ruby on Rails which allows attackers to bypass authentication systems, inject arbitrary SQL, inject and execute arbitrary code, or perform a DoS attack on a Rails application. ## Rails 3.0.20 (unreleased) * Fix XML serialization of methods that return nil to not be considered as YAML (GH #8853 and GH #492)
This commit is contained in:
parent
7fafbba2d1
commit
3340fae8ed
1 changed files with 4 additions and 4 deletions
|
@ -1,5 +1,5 @@
|
|||
$NetBSD: distinfo,v 1.17 2013/01/09 12:26:20 taca Exp $
|
||||
$NetBSD: distinfo,v 1.18 2013/01/29 15:38:40 taca Exp $
|
||||
|
||||
SHA1 (activemodel-3.0.19.gem) = f0fb577ea7446ff229752bc799ca86dd53aa9cda
|
||||
RMD160 (activemodel-3.0.19.gem) = b79defa8b68fa49226429a0f616659f8aab7bf4f
|
||||
Size (activemodel-3.0.19.gem) = 38912 bytes
|
||||
SHA1 (activemodel-3.0.20.gem) = 80c7d881ed64ed7a66f4d82b12c2b98b43f6fbde
|
||||
RMD160 (activemodel-3.0.20.gem) = 20c74da6d7a173a5d5a252a138afa5b132f9a7b9
|
||||
Size (activemodel-3.0.20.gem) = 38912 bytes
|
||||
|
|
Loading…
Reference in a new issue