AArch64 | |
ppc64le | |
s390x | |
x86-64 |
- updated to version 5.2.3 see installed CHANGELOG.md [#]# Rails 5.2.3 (March 27, 2019) ## * No changes.
- update to version 5.2.2.1: https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ CVE-2019-5418 CVE-2019-5419 CVE-2019-5420
- rb_build_ruby_abi needs to be rb_build_ruby_abis
- limit to ruby 2.5 and above for 42.3/sle12
- updated to version 5.2.2 see installed CHANGELOG.md [#]# Rails 5.2.2 (December 04, 2018) ## * Make sure `assert_enqueued_with()` & `assert_performed_with()` work reliably with hash arguments. * Sharang Dashputre* * Restore `ActionController::Parameters` support to `ActiveJob::Arguments.serialize`. * Bernie Chiu* * Restore `HashWithIndifferentAccess` support to `ActiveJob::Arguments.deserialize`. * Gannon McGibbon* * Include deserialized arguments in job instances returned from `assert_enqueued_with` and `assert_performed_with` * Alan Wu* * Increment execution count before deserialize arguments. Currently, the execution count increments after deserializes arguments. Therefore, if an error occurs with deserialize, it retries indefinitely. * Yuji Yaginuma*
- updated to version 5.2.1.1 (boo#1118076) - addresses a security vulnerability (CVE-2018-16476, bsc#1117632) Carefully crafted user input can cause Active Job to deserialize it using GlobalId and allow an attacker to have access to information that they should not have. Vulnerable code will look something like this: MyJob.perform_later(user_input) All users running an affected release should either upgrade or use one of the workarounds immediately.
- updated to version 5.2.1 (boo#1104209) * Pass the error instance as the second parameter of block executed by `discard_on`. Fixes #32853. (Yuji Yaginuma)
- initialize package see changelog: https://github.com/rails/rails/blob/v5.2.0/activejob/CHANGELOG.md