Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency activerecord to v7.0.3.1 [SECURITY] #130

Merged
merged 1 commit into from
Jul 12, 2022

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jul 12, 2022

Mend Renovate

This PR contains the following updates:

Package Update Change
activerecord patch 7.0.2.2 -> 7.0.3.1

GitHub Vulnerability Alerts

CVE-2022-32224

When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE.

There are no feasible workarounds for this issue, but other coders (such as JSON) are not impacted.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, click this checkbox.

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot added the dependencies Pull requests that update a dependency file label Jul 12, 2022
@renovate renovate bot merged commit 4408ea2 into master Jul 12, 2022
@renovate renovate bot deleted the renovate/rubygems-activerecord-vulnerability branch July 12, 2022 22:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants