pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/www/ruby-actionpack31 Update ruby-actionpack31 to 3.1.8.



details:   https://anonhg.NetBSD.org/pkgsrc/rev/84728a3020ec
branches:  trunk
changeset: 607463:84728a3020ec
user:      taca <taca%pkgsrc.org@localhost>
date:      Sun Aug 12 10:34:38 2012 +0000

description:
Update ruby-actionpack31 to 3.1.8.

## Rails 3.1.8 (Aug 9, 2012)

* There is an XSS vulnerability in the strip_tags helper in Ruby on Rails, the
  helper doesn't correctly handle malformed html.  As a result an attacker can
  execute arbitrary javascript through the use of specially crafted malformed
  html.

  *Marek from Nethemba (www.nethemba.com) & Santiago Pastorino*

* When a "prompt" value is supplied to the `select_tag` helper, the
  "prompt" value is not escaped.
  If untrusted data is not escaped, and is supplied as the prompt value,
  there is a potential for XSS attacks.
  Vulnerable code will look something like this:
    select_tag("name", options, :prompt => UNTRUSTED_INPUT)

  *Santiago Pastorino*

diffstat:

 www/ruby-actionpack31/distinfo |  8 ++++----
 1 files changed, 4 insertions(+), 4 deletions(-)

diffs (13 lines):

diff -r d9c156fd880e -r 84728a3020ec www/ruby-actionpack31/distinfo
--- a/www/ruby-actionpack31/distinfo    Sun Aug 12 10:33:48 2012 +0000
+++ b/www/ruby-actionpack31/distinfo    Sun Aug 12 10:34:38 2012 +0000
@@ -1,5 +1,5 @@
-$NetBSD: distinfo,v 1.6 2012/07/31 12:38:13 taca Exp $
+$NetBSD: distinfo,v 1.7 2012/08/12 10:34:38 taca Exp $
 
-SHA1 (actionpack-3.1.7.gem) = d6d7d99e6b4c30f80ca5a1d321f44aefeb5583cf
-RMD160 (actionpack-3.1.7.gem) = b49e3389c06c965c43aeb3a18893bcd44bd5797b
-Size (actionpack-3.1.7.gem) = 367616 bytes
+SHA1 (actionpack-3.1.8.gem) = 20d22f75b553e897808269ad308405570d2c874b
+RMD160 (actionpack-3.1.8.gem) = 9343ed89627b3a9dd6d4eca3d82a9d66fae09853
+Size (actionpack-3.1.8.gem) = 368128 bytes



Home | Main Index | Thread Index | Old Index