0b86a1339d
Rails 5.2.8.1 (2022-07-12) updates databases/ruby-activerecord52 only. databases/ruby-activerecord52 * Change ActiveRecord::Coders::YAMLColumn default to safe_load This adds two new configuration options The configuration options are as follows: o config.active_storage.use_yaml_unsafe_load When set to true, this configuration option tells Rails to use the old "unsafe" YAML loading strategy, maintaining the existing behavior but leaving the possible escalation vulnerability in place. Setting this option to true is *not* recommended, but can aid in upgrading. o config.active_record.yaml_column_permitted_classes The "safe YAML" loading method does not allow all classes to be deserialized by default. This option allows you to specify classes deemed "safe" in your application. For example, if your application uses Symbol and Time in serialized data, you can add Symbol and Time to the allowed list as follows: config.active_record.yaml_column_permitted_classes = [Symbol, Date, Time] [CVE-2022-32224]
5 lines
365 B
Text
5 lines
365 B
Text
$NetBSD: distinfo,v 1.15 2022/07/13 14:41:08 taca Exp $
|
|
|
|
BLAKE2s (actionview-5.2.8.1.gem) = 277db3a85706a9d6a0d247fec8f3c9b16d4af453ef39a337564b8fa2992f7ad6
|
|
SHA512 (actionview-5.2.8.1.gem) = 2d9b7a9ac66812a16df065732ed340519a6eacd08dd28da6d4a1eafeea028749a9194d27261457402ffe3a5a6df68762d07339a88ce9b559b278165a3a62e098
|
|
Size (actionview-5.2.8.1.gem) = 163840 bytes
|