diff --git a/gems/actionpack/CVE-2023-22792.yml b/gems/actionpack/CVE-2023-22792.yml index 0e38c99a9d..c969646885 100644 --- a/gems/actionpack/CVE-2023-22792.yml +++ b/gems/actionpack/CVE-2023-22792.yml @@ -32,6 +32,6 @@ description: | unaffected_versions: - "< 3.0.0" patched_versions: -- "~> 5.2.8, >= 5.2.8.15" # Rails LTS +- "~> 5.2.8, >= 5.2.8.15" # Rails LTS - "~> 6.1.7, >= 6.1.7.1" - ">= 7.0.4.1" diff --git a/gems/actionpack/CVE-2023-22795.yml b/gems/actionpack/CVE-2023-22795.yml index d8ceac4023..f9977f8c7f 100644 --- a/gems/actionpack/CVE-2023-22795.yml +++ b/gems/actionpack/CVE-2023-22795.yml @@ -32,6 +32,6 @@ description: |- Users on Ruby 3.2.0 or greater are not affected by this vulnerability. patched_versions: -- "~> 5.2.8, >= 5.2.8.15" # Rails LTS +- "~> 5.2.8, >= 5.2.8.15" # Rails LTS - "~> 6.1.7, >= 6.1.7.1" - ">= 7.0.4.1" diff --git a/gems/activerecord/CVE-2022-44566.yml b/gems/activerecord/CVE-2022-44566.yml index 9666bfe069..fa01917fa2 100644 --- a/gems/activerecord/CVE-2022-44566.yml +++ b/gems/activerecord/CVE-2022-44566.yml @@ -28,6 +28,6 @@ description: | Ensure that user supplied input which is provided to ActiveRecord clauses do not contain integers wider than a signed 64bit representation or floats. patched_versions: -- "~> 5.2.8, >= 5.2.8.15" # Rails LTS +- "~> 5.2.8, >= 5.2.8.15" # Rails LTS - "~> 6.1.7, >= 6.1.7.1" - ">= 7.0.4.1" diff --git a/gems/activesupport/CVE-2023-22796.yml b/gems/activesupport/CVE-2023-22796.yml index 778e972c11..8ee45f215f 100644 --- a/gems/activesupport/CVE-2023-22796.yml +++ b/gems/activesupport/CVE-2023-22796.yml @@ -34,6 +34,6 @@ description: |- Users on Ruby 3.2.0 or greater may be able to reduce the impact by configuring Regexp.timeout. patched_versions: -- "~> 5.2.8, >= 5.2.8.15" # Rails LTS +- "~> 5.2.8, >= 5.2.8.15" # Rails LTS - "~> 6.1.7, >= 6.1.7.1" - ">= 7.0.4.1"