Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
Please login to access the resource
openSUSE:Backports:SLE-15-SP6:Update
rubygem-activestorage-5.2
rubygem-activestorage-5.2.changes
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File rubygem-activestorage-5.2.changes of Package rubygem-activestorage-5.2
------------------------------------------------------------------- Fri Mar 29 05:54:13 UTC 2019 - Stephan Kulow <coolo@suse.com> - updated to version 5.2.3 see installed CHANGELOG.md ## Rails 5.2.3 (March 27, 2019) ## * No changes. ------------------------------------------------------------------- Thu Mar 14 03:44:41 UTC 2019 - Marcus Rueckert <mrueckert@suse.de> - update to version 5.2.2.1: https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ CVE-2019-5418 CVE-2019-5419 CVE-2019-5420 ------------------------------------------------------------------- Sat Jan 19 19:51:01 UTC 2019 - Marcus Rueckert <mrueckert@suse.de> - rb_build_ruby_abi needs to be rb_build_ruby_abis ------------------------------------------------------------------- Fri Jan 18 16:24:41 UTC 2019 - Marcus Rueckert <mrueckert@suse.de> - limit to ruby 2.5 and above for 42.3/sle12 ------------------------------------------------------------------- Sat Dec 8 16:17:06 UTC 2018 - Stephan Kulow <coolo@suse.com> - updated to version 5.2.2 see installed CHANGELOG.md ## Rails 5.2.2 (December 04, 2018) ## * Support multiple submit buttons in Active Storage forms. *Chrıs Seelus* * Fix `ArgumentError` when uploading to amazon s3 *Hiroki Sanpei* * Add a foreign-key constraint to the `active_storage_attachments` table for blobs. *George Claghorn* * Discard `ActiveStorage::PurgeJobs` for missing blobs. *George Claghorn* * Fix uploading Tempfiles to Azure Storage. *George Claghorn* ------------------------------------------------------------------- Mon Dec 3 06:26:14 UTC 2018 - mschnitzer@suse.com - updated to version 5.2.1.1 (boo#1118076) - addresses a security vulnerability (CVE-2018-16477, boo#1117641) Signed download URLs generated by `ActiveStorage` for Google Cloud Storage service and Disk service include `content-disposition` and `content-type` parameters that an attacker can modify. This can be used to upload specially crafted HTML files and have them served and executed inline. Combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path. Vulnerable apps are those using either GCS or the Disk service in production. Other storage services such as S3 or Azure aren't affected. All users running an affected release should either upgrade or use one of the workarounds immediately. For those using GCS, it's also recommended to run the following to update existing blobs: ``` ActiveStorage::Blob.find_each do |blob| blob.send :update_service_metadata end ``` ------------------------------------------------------------------- Wed Aug 8 14:54:46 UTC 2018 - mschnitzer@suse.com - updated to version 5.2.1 (boo#1104209) * Fix direct upload with zero-byte files. (George Claghorn) * Exclude JSON root from `active_storage/direct_uploads#create` response. (Javan Makhmali) ------------------------------------------------------------------- Mon Apr 16 12:19:10 UTC 2018 - mschnitzer@suse.com - initialize package see changelog: https://github.com/rails/rails/blob/v5.2.0/activestorage/CHANGELOG.md
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor