Update ruby-activemodel to 3.0.20.

Fix CVE-2013-0333.

There is a vulnerability in the JSON  code for Ruby on Rails which
allows attackers to bypass authentication systems, inject arbitrary
SQL, inject and execute arbitrary code, or perform a DoS attack on a
Rails application.

## Rails 3.0.20 (unreleased)

* Fix XML serialization of methods that return nil to not be
  considered as YAML (GH #8853 and GH #492)
This commit is contained in:
taca 2013-01-29 15:38:40 +00:00
parent 7fafbba2d1
commit 3340fae8ed

View file

@ -1,5 +1,5 @@
$NetBSD: distinfo,v 1.17 2013/01/09 12:26:20 taca Exp $
$NetBSD: distinfo,v 1.18 2013/01/29 15:38:40 taca Exp $
SHA1 (activemodel-3.0.19.gem) = f0fb577ea7446ff229752bc799ca86dd53aa9cda
RMD160 (activemodel-3.0.19.gem) = b79defa8b68fa49226429a0f616659f8aab7bf4f
Size (activemodel-3.0.19.gem) = 38912 bytes
SHA1 (activemodel-3.0.20.gem) = 80c7d881ed64ed7a66f4d82b12c2b98b43f6fbde
RMD160 (activemodel-3.0.20.gem) = 20c74da6d7a173a5d5a252a138afa5b132f9a7b9
Size (activemodel-3.0.20.gem) = 38912 bytes