Fedora Linux 8485 Published by

A rubygem-activerecord security update has been released for Fedora 37.



SECURITY: Fedora 37 Update: rubygem-activerecord-7.0.4.3-1.fc37


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-7002afbbb8
2023-04-05 01:34:43.146270
--------------------------------------------------------------------------------

Name : rubygem-activerecord
Product : Fedora 37
Version : 7.0.4.3
Release : 1.fc37
URL :   http://rubyonrails.org
Summary : Object-relational mapper framework (part of Rails)
Description :
Implements the ActiveRecord pattern (Fowler, PoEAA) for ORM. It ties database
tables and classes together for business objects, like Customer or
Subscription, that can find, save, and destroy themselves without resorting to
manual SQL.

--------------------------------------------------------------------------------
Update Information:

Update to Ruby on Rails 7.0.4.3.
  https://rubyonrails.org/2023/3/13/Rails-7-0-4-3-and-6-1-7-3-have-been-released
--------------------------------------------------------------------------------
ChangeLog:

* Tue Mar 14 2023 Pavel Valena - 1:7.0.4.3-1
- Update to activerecord 7.0.4.3.
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2179637 - CVE-2023-28120 rubygem-activesupport: Possible XSS in SafeBuffer#bytesplice
  https://bugzilla.redhat.com/show_bug.cgi?id=2179637
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-7002afbbb8' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________