--- - branch: pkgsrc-2022Q4 date: Sat Mar 4 13:26:59 UTC 2023 files: - new: 1.13.10.1 old: '1.13' path: pkgsrc/devel/ruby-globalid/Makefile pathrev: pkgsrc/devel/ruby-globalid/Makefile@1.13.10.1 type: modified - new: 1.7.10.1 old: '1.7' path: pkgsrc/devel/ruby-globalid/distinfo pathrev: pkgsrc/devel/ruby-globalid/distinfo@1.7.10.1 type: modified id: 20230304T132659Z.023e4aad466e83a603449dc17579e615e21e4ed4 log: "Pullup ticket #6729 - requested by taca\ndevel/ruby-globalid: security update\n\nRevisions pulled up:\n- devel/ruby-globalid/Makefile 1.14\n- devel/ruby-globalid/distinfo 1.8\n\n-------------------------------------------------------------------\n \ Module Name:\tpkgsrc\n Committed By:\ttaca\n Date:\t\tThu Jan 19 13:58:19 UTC 2023\n\n Modified Files:\n \tpkgsrc/devel/ruby-globalid: Makefile distinfo\n\n \ Log Message:\n devel/ruby-globalid: update to 1.0.1\n\n 1.0.1 (2023-01-17)\n\n \ Possible ReDoS based DoS vulnerability in GlobalID\n\n There is a ReDoS based DoS vulnerability in the GlobalID gem. This\n vulnerability has been assigned the CVE identifier CVE-2023-22799.\n\n Versions Affected: >= 0.2.1\n Not affected: NOTAFFECTED\n Fixed Versions: 1.0.1\n\n Impact\n\n There is a possible DoS vulnerability in the model name parsing section of\n the GlobalID gem. Carefully crafted input can cause the regular expression\n engine to take an unexpected amount of time. All users running an affected\n release should either upgrade or use one of the workarounds immediately.\n\n Releases\n\n The FIXED releases are available at the normal locations.\n\n Workarounds\n\n There are no feasible workarounds for this issue.\n\n Credits\n\n Thank you ooooooo_k for reporting this!\n\n To generate a diff of this commit:\n cvs rdiff -u -r1.13 -r1.14 pkgsrc/devel/ruby-globalid/Makefile\n cvs rdiff -u -r1.7 -r1.8 pkgsrc/devel/ruby-globalid/distinfo\n" module: pkgsrc subject: 'CVS commit: [pkgsrc-2022Q4] pkgsrc/devel/ruby-globalid' unixtime: '1677936419' user: spz