Ruby/activesupport/7.0.0.alpha2


A toolkit of support libraries and Ruby core extensions extracted from the Rails framework. Rich support for multibyte strings, internationalization, time zones, and testing.

https://rubygems.org/gems/activesupport
MIT

3 Security Vulnerabilities

ReDoS based DoS vulnerability in Active Support’s underscore

Published date: 2023-01-18
Framework: rails
CVE: 2023-22796
Links:

There is a possible regular expression based DoS vulnerability in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-22796.

Versions Affected: All Not affected: None Fixed Versions: 5.2.8.15 (Rails LTS), 6.1.7.1, 7.0.4.1

Impact

A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of CPU and memory, leading to a possible DoS vulnerability.

This affects String#underscore, ActiveSupport::Inflector.underscore, String#titleize, and any other methods using these.

All users running an affected release should either upgrade or use one of the workarounds immediately.

Workarounds

There are no feasible workarounds for this issue.

Users on Ruby 3.2.0 or greater may be able to reduce the impact by configuring Regexp.timeout.

Affected versions: ["6.0.3.4", "6.0.3.3", "6.0.3.2", "6.0.3.1", "6.0.3", "6.0.3.rc1", "6.0.2.2", "6.0.2.1", "6.0.2", "6.0.2.rc2", "6.0.2.rc1", "6.0.1", "6.0.1.rc1", "6.0.0", "6.0.0.rc2", "6.0.0.rc1", "6.0.0.beta3", "6.0.0.beta2", "6.0.0.beta1", "5.1.7", "5.1.7.rc1", "5.1.6.2", "5.1.6.1", "5.1.6", "5.1.5", "5.1.5.rc1", "5.1.4", "5.1.4.rc1", "5.1.3", "5.1.3.rc3", "5.1.3.rc2", "5.1.3.rc1", "5.1.2", "5.1.2.rc1", "5.1.1", "5.1.0", "5.1.0.rc2", "5.1.0.rc1", "5.1.0.beta1", "5.0.7.2", "5.0.7.1", "5.0.7", "5.0.6", "5.0.6.rc1", "5.0.5", "5.0.5.rc2", "5.0.5.rc1", "5.0.4", "5.0.4.rc1", "5.0.3", "5.0.2", "5.0.2.rc1", "5.0.1", "5.0.1.rc2", "5.0.1.rc1", "5.0.0.1", "5.0.0", "5.0.0.rc2", "5.0.0.rc1", "5.0.0.racecar1", "5.0.0.beta4", "5.0.0.beta3", "5.0.0.beta2", "5.0.0.beta1.1", "5.0.0.beta1", "4.2.11.3", "4.2.11.2", "4.2.11.1", "4.2.11", "4.2.10", "4.2.10.rc1", "4.2.9", "4.2.9.rc2", "4.2.9.rc1", "4.2.8", "4.2.8.rc1", "4.2.7.1", "4.2.7", "4.2.7.rc1", "4.2.6", "4.2.6.rc1", "4.2.5.2", "4.2.5.1", "4.2.5", "4.2.5.rc2", "4.2.5.rc1", "4.2.4", "4.2.4.rc1", "4.2.3", "4.2.3.rc1", "4.2.2", "4.2.1", "4.2.1.rc4", "4.2.1.rc3", "4.2.1.rc2", "4.2.1.rc1", "4.2.0", "4.2.0.rc3", "4.2.0.rc2", "4.2.0.rc1", "4.2.0.beta4", "4.2.0.beta3", "4.2.0.beta2", "4.2.0.beta1", "4.1.16", "4.1.16.rc1", "4.1.15", "4.1.15.rc1", "4.1.14.2", "4.1.14.1", "4.1.14", "4.1.14.rc2", "4.1.14.rc1", "4.1.13", "4.1.13.rc1", "4.1.12", "4.1.12.rc1", "4.1.11", "4.1.10", "4.1.10.rc4", "4.1.10.rc3", "4.1.10.rc2", "4.1.10.rc1", "4.1.9", "4.1.9.rc1", "4.1.8", "4.1.7.1", "4.1.7", "4.1.6", "4.1.6.rc2", "4.1.6.rc1", "4.1.5", "4.1.4", "4.1.3", "4.1.2", "4.1.2.rc3", "4.1.2.rc2", "4.1.2.rc1", "4.1.1", "4.1.0", "4.1.0.rc2", "4.1.0.rc1", "4.1.0.beta2", "4.1.0.beta1", "4.0.13", "4.0.13.rc1", "4.0.12", "4.0.11.1", "4.0.11", "4.0.10", "4.0.10.rc2", "4.0.10.rc1", "4.0.9", "4.0.8", "4.0.7", "4.0.6", "4.0.6.rc3", "4.0.6.rc2", "4.0.6.rc1", "4.0.5", "4.0.4", "4.0.4.rc1", "4.0.3", "4.0.2", "4.0.1", "4.0.1.rc4", "4.0.1.rc3", "4.0.1.rc2", "4.0.1.rc1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "4.0.0.beta1", "3.2.22.5", "3.2.22.4", "3.2.22.3", "3.2.22.2", "3.2.22.1", "3.2.22", "3.2.21", "3.2.20", "3.2.19", "3.2.18", "3.2.17", "3.2.16", "3.2.15", "3.2.15.rc3", "3.2.15.rc2", "3.2.15.rc1", "3.2.14", "3.2.14.rc2", "3.2.14.rc1", "3.2.13", "3.2.13.rc2", "3.2.13.rc1", "3.2.12", "3.2.11", "3.2.10", "3.2.9", "3.2.9.rc3", "3.2.9.rc2", "3.2.9.rc1", "3.2.8", "3.2.8.rc2", "3.2.8.rc1", "3.2.7", "3.2.7.rc1", "3.2.6", "3.2.5", "3.2.4", "3.2.4.rc1", "3.2.3", "3.2.3.rc2", "3.2.3.rc1", "3.2.2", "3.2.2.rc1", "3.2.1", "3.2.0", "3.2.0.rc2", "3.2.0.rc1", "3.1.12", "3.1.11", "3.1.10", "3.1.9", "3.1.8", "3.1.7", "3.1.6", "3.1.5", "3.1.5.rc1", "3.1.4", "3.1.4.rc1", "3.1.3", "3.1.2", "3.1.2.rc2", "3.1.2.rc1", "3.1.1", "3.1.1.rc3", "3.1.1.rc2", "3.1.1.rc1", "3.1.0", "3.1.0.rc8", "3.1.0.rc6", "3.1.0.rc5", "3.1.0.rc4", "3.1.0.rc3", "3.1.0.rc2", "3.1.0.rc1", "3.1.0.beta1", "3.0.20", "3.0.19", "3.0.18", "3.0.17", "3.0.16", "3.0.15", "3.0.14", "3.0.13", "3.0.13.rc1", "3.0.12", "3.0.12.rc1", "3.0.11", "3.0.10", "3.0.10.rc1", "3.0.9", "3.0.9.rc5", "3.0.9.rc4", "3.0.9.rc3", "3.0.9.rc1", "3.0.8", "3.0.8.rc4", "3.0.8.rc2", "3.0.8.rc1", "3.0.7", "3.0.7.rc2", "3.0.7.rc1", "3.0.6", "3.0.6.rc2", "3.0.6.rc1", "3.0.5", "3.0.5.rc1", "3.0.4", "3.0.4.rc1", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc2", "3.0.0.rc", "3.0.0.beta4", "3.0.0.beta3", "3.0.0.beta2", "3.0.0.beta", "3.0.pre", "2.3.18", "2.3.17", "2.3.16", "2.3.15", "2.3.14", "2.3.12", "2.3.11", "2.3.10", "2.3.9", "2.3.9.pre", "2.3.8", "2.3.8.pre1", "2.3.7", "2.3.6", "2.3.6.pre", "2.3.5", "2.3.4", "2.3.3", "2.3.2", "2.2.3", "2.2.2", "2.1.2", "2.1.1", "2.1.0", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "1.4.4", "1.4.3", "1.4.2", "1.4.1", "1.4.0", "1.3.1", "1.3.0", "1.2.5", "1.2.4", "1.2.3", "1.2.2", "1.2.1", "1.1.1", "1.1.0", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "6.0.3.5", "6.0.3.6", "6.0.3.7", "6.0.4", "6.0.4.1", "7.0.0.alpha2", "7.0.0.alpha1", "7.0.0.rc1", "7.0.0.rc3", "7.0.0.rc2", "6.0.4.3", "6.0.4.2", "6.0.4.4", "7.0.0", "7.0.1", "7.0.2", "7.0.2.2", "7.0.2.1", "6.0.4.6", "6.0.4.5", "7.0.2.3", "6.0.4.7", "7.0.2.4", "6.0.4.8", "7.0.3", "6.0.5", "7.0.3.1", "6.0.5.1", "7.0.4", "6.0.6", "6.0.6.1"]
Secure versions: [7.0.7.2, 7.0.7.1, 6.1.7.6, 6.1.7.5, 7.0.8, 7.1.0.beta1, 7.1.0.rc1, 7.1.0.rc2, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.3.2, 7.1.3.1, 7.0.8.1, 6.1.7.7, 7.1.3.3, 7.0.8.2, 7.0.8.3, 7.2.0.beta1, 7.2.0.beta2, 7.1.3.4, 7.0.8.4, 6.1.7.8, 7.2.0.beta3, 7.2.0.rc1, 7.2.0, 7.2.1, 7.1.4, 8.0.0.beta1, 7.2.1.1, 7.1.4.1, 7.0.8.5, 6.1.7.9, 8.0.0.rc1, 7.2.1.2, 7.1.4.2, 7.0.8.6, 6.1.7.10, 8.0.0.rc2, 7.2.2, 7.1.5, 8.0.0]
Recommendation: Update to version 8.0.0.

Possible XSS Security Vulnerability in SafeBuffer#bytesplice

Published date: 2023-03-13
Framework: rails
CVE: 2023-28120
Links:

There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input. This vulnerability has been assigned the CVE identifier CVE-2023-28120.

Versions Affected: All. Not affected: None Fixed Versions: 7.0.4.3, 6.1.7.3

Impact

ActiveSupport uses the SafeBuffer string subclass to tag strings as htmlsafe after they have been sanitized. When these strings are mutated, the tag is should be removed to mark them as no longer being htmlsafe.

Ruby 3.2 introduced a new bytesplice method which ActiveSupport did not yet understand to be a mutation. Users on older versions of Ruby are likely unaffected.

All users running an affected release and using bytesplice should either upgrade or use one of the workarounds immediately.

Workarounds

Avoid calling bytesplice on a SafeBuffer (html_safe) string with untrusted user input.

Affected versions: ["6.0.3.4", "6.0.3.3", "6.0.3.2", "6.0.3.1", "6.0.3", "6.0.3.rc1", "6.0.2.2", "6.0.2.1", "6.0.2", "6.0.2.rc2", "6.0.2.rc1", "6.0.1", "6.0.1.rc1", "6.0.0", "6.0.0.rc2", "6.0.0.rc1", "6.0.0.beta3", "6.0.0.beta2", "6.0.0.beta1", "5.2.4.4", "5.2.4.3", "5.2.4.2", "5.2.4.1", "5.2.4", "5.2.4.rc1", "5.2.3", "5.2.3.rc1", "5.2.2.1", "5.2.2", "5.2.2.rc1", "5.2.1.1", "5.2.1", "5.2.1.rc1", "5.2.0", "5.2.0.rc2", "5.2.0.rc1", "5.2.0.beta2", "5.2.0.beta1", "5.1.7", "5.1.7.rc1", "5.1.6.2", "5.1.6.1", "5.1.6", "5.1.5", "5.1.5.rc1", "5.1.4", "5.1.4.rc1", "5.1.3", "5.1.3.rc3", "5.1.3.rc2", "5.1.3.rc1", "5.1.2", "5.1.2.rc1", "5.1.1", "5.1.0", "5.1.0.rc2", "5.1.0.rc1", "5.1.0.beta1", "5.0.7.2", "5.0.7.1", "5.0.7", "5.0.6", "5.0.6.rc1", "5.0.5", "5.0.5.rc2", "5.0.5.rc1", "5.0.4", "5.0.4.rc1", "5.0.3", "5.0.2", "5.0.2.rc1", "5.0.1", "5.0.1.rc2", "5.0.1.rc1", "5.0.0.1", "5.0.0", "5.0.0.rc2", "5.0.0.rc1", "5.0.0.racecar1", "5.0.0.beta4", "5.0.0.beta3", "5.0.0.beta2", "5.0.0.beta1.1", "5.0.0.beta1", "4.2.11.3", "4.2.11.2", "4.2.11.1", "4.2.11", "4.2.10", "4.2.10.rc1", "4.2.9", "4.2.9.rc2", "4.2.9.rc1", "4.2.8", "4.2.8.rc1", "4.2.7.1", "4.2.7", "4.2.7.rc1", "4.2.6", "4.2.6.rc1", "4.2.5.2", "4.2.5.1", "4.2.5", "4.2.5.rc2", "4.2.5.rc1", "4.2.4", "4.2.4.rc1", "4.2.3", "4.2.3.rc1", "4.2.2", "4.2.1", "4.2.1.rc4", "4.2.1.rc3", "4.2.1.rc2", "4.2.1.rc1", "4.2.0", "4.2.0.rc3", "4.2.0.rc2", "4.2.0.rc1", "4.2.0.beta4", "4.2.0.beta3", "4.2.0.beta2", "4.2.0.beta1", "4.1.16", "4.1.16.rc1", "4.1.15", "4.1.15.rc1", "4.1.14.2", "4.1.14.1", "4.1.14", "4.1.14.rc2", "4.1.14.rc1", "4.1.13", "4.1.13.rc1", "4.1.12", "4.1.12.rc1", "4.1.11", "4.1.10", "4.1.10.rc4", "4.1.10.rc3", "4.1.10.rc2", "4.1.10.rc1", "4.1.9", "4.1.9.rc1", "4.1.8", "4.1.7.1", "4.1.7", "4.1.6", "4.1.6.rc2", "4.1.6.rc1", "4.1.5", "4.1.4", "4.1.3", "4.1.2", "4.1.2.rc3", "4.1.2.rc2", "4.1.2.rc1", "4.1.1", "4.1.0", "4.1.0.rc2", "4.1.0.rc1", "4.1.0.beta2", "4.1.0.beta1", "4.0.13", "4.0.13.rc1", "4.0.12", "4.0.11.1", "4.0.11", "4.0.10", "4.0.10.rc2", "4.0.10.rc1", "4.0.9", "4.0.8", "4.0.7", "4.0.6", "4.0.6.rc3", "4.0.6.rc2", "4.0.6.rc1", "4.0.5", "4.0.4", "4.0.4.rc1", "4.0.3", "4.0.2", "4.0.1", "4.0.1.rc4", "4.0.1.rc3", "4.0.1.rc2", "4.0.1.rc1", "4.0.0", "4.0.0.rc2", "4.0.0.rc1", "4.0.0.beta1", "3.2.22.5", "3.2.22.4", "3.2.22.3", "3.2.22.2", "3.2.22.1", "3.2.22", "3.2.21", "3.2.20", "3.2.19", "3.2.18", "3.2.17", "3.2.16", "3.2.15", "3.2.15.rc3", "3.2.15.rc2", "3.2.15.rc1", "3.2.14", "3.2.14.rc2", "3.2.14.rc1", "3.2.13", "3.2.13.rc2", "3.2.13.rc1", "3.2.12", "3.2.11", "3.2.10", "3.2.9", "3.2.9.rc3", "3.2.9.rc2", "3.2.9.rc1", "3.2.8", "3.2.8.rc2", "3.2.8.rc1", "3.2.7", "3.2.7.rc1", "3.2.6", "3.2.5", "3.2.4", "3.2.4.rc1", "3.2.3", "3.2.3.rc2", "3.2.3.rc1", "3.2.2", "3.2.2.rc1", "3.2.1", "3.2.0", "3.2.0.rc2", "3.2.0.rc1", "3.1.12", "3.1.11", "3.1.10", "3.1.9", "3.1.8", "3.1.7", "3.1.6", "3.1.5", "3.1.5.rc1", "3.1.4", "3.1.4.rc1", "3.1.3", "3.1.2", "3.1.2.rc2", "3.1.2.rc1", "3.1.1", "3.1.1.rc3", "3.1.1.rc2", "3.1.1.rc1", "3.1.0", "3.1.0.rc8", "3.1.0.rc6", "3.1.0.rc5", "3.1.0.rc4", "3.1.0.rc3", "3.1.0.rc2", "3.1.0.rc1", "3.1.0.beta1", "3.0.20", "3.0.19", "3.0.18", "3.0.17", "3.0.16", "3.0.15", "3.0.14", "3.0.13", "3.0.13.rc1", "3.0.12", "3.0.12.rc1", "3.0.11", "3.0.10", "3.0.10.rc1", "3.0.9", "3.0.9.rc5", "3.0.9.rc4", "3.0.9.rc3", "3.0.9.rc1", "3.0.8", "3.0.8.rc4", "3.0.8.rc2", "3.0.8.rc1", "3.0.7", "3.0.7.rc2", "3.0.7.rc1", "3.0.6", "3.0.6.rc2", "3.0.6.rc1", "3.0.5", "3.0.5.rc1", "3.0.4", "3.0.4.rc1", "3.0.3", "3.0.2", "3.0.1", "3.0.0", "3.0.0.rc2", "3.0.0.rc", "3.0.0.beta4", "3.0.0.beta3", "3.0.0.beta2", "3.0.0.beta", "3.0.pre", "2.3.18", "2.3.17", "2.3.16", "2.3.15", "2.3.14", "2.3.12", "2.3.11", "2.3.10", "2.3.9", "2.3.9.pre", "2.3.8", "2.3.8.pre1", "2.3.7", "2.3.6", "2.3.6.pre", "2.3.5", "2.3.4", "2.3.3", "2.3.2", "2.2.3", "2.2.2", "2.1.2", "2.1.1", "2.1.0", "2.0.5", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "1.4.4", "1.4.3", "1.4.2", "1.4.1", "1.4.0", "1.3.1", "1.3.0", "1.2.5", "1.2.4", "1.2.3", "1.2.2", "1.2.1", "1.1.1", "1.1.0", "1.0.4", "1.0.3", "1.0.2", "1.0.1", "1.0.0", "6.0.3.5", "5.2.4.5", "6.0.3.6", "5.2.5", "6.0.3.7", "5.2.6", "5.2.4.6", "6.0.4", "6.0.4.1", "7.0.0.alpha2", "7.0.0.alpha1", "7.0.0.rc1", "7.0.0.rc3", "7.0.0.rc2", "6.0.4.3", "6.0.4.2", "6.0.4.4", "7.0.0", "7.0.1", "7.0.2", "7.0.2.2", "7.0.2.1", "6.0.4.6", "6.0.4.5", "5.2.6.2", "5.2.6.1", "7.0.2.3", "6.0.4.7", "5.2.6.3", "5.2.7", "7.0.2.4", "6.0.4.8", "5.2.7.1", "7.0.3", "6.0.5", "5.2.8", "7.0.3.1", "6.0.5.1", "5.2.8.1", "7.0.4", "6.0.6", "7.0.4.1", "6.0.6.1", "7.0.4.2"]
Secure versions: [7.0.7.2, 7.0.7.1, 6.1.7.6, 6.1.7.5, 7.0.8, 7.1.0.beta1, 7.1.0.rc1, 7.1.0.rc2, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.3.2, 7.1.3.1, 7.0.8.1, 6.1.7.7, 7.1.3.3, 7.0.8.2, 7.0.8.3, 7.2.0.beta1, 7.2.0.beta2, 7.1.3.4, 7.0.8.4, 6.1.7.8, 7.2.0.beta3, 7.2.0.rc1, 7.2.0, 7.2.1, 7.1.4, 8.0.0.beta1, 7.2.1.1, 7.1.4.1, 7.0.8.5, 6.1.7.9, 8.0.0.rc1, 7.2.1.2, 7.1.4.2, 7.0.8.6, 6.1.7.10, 8.0.0.rc2, 7.2.2, 7.1.5, 8.0.0]
Recommendation: Update to version 8.0.0.

Possible File Disclosure of Locally Encrypted Files

Published date: 2023-08-23
Framework: rails
CVE: 2023-38037
Links:

There is a possible file disclosure of locally encrypted files in Active Support. This vulnerability has been assigned the CVE identifier CVE-2023-38037.

Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.7.1, 6.1.7.5

Impact

ActiveSupport::EncryptedFile writes contents that will be encrypted to a temporary file. The temporary file’s permissions are defaulted to the user’s current umask settings, meaning that it’s possible for other users on the same system to read the contents of the temporary file.

Attackers that have access to the file system could possibly read the contents of this temporary file while a user is editing it.

All users running an affected release should either upgrade or use one of the workarounds immediately.

Releases

The fixed releases are available at the normal locations.

Workarounds

To work around this issue, you can set your umask to be more restrictive like this:

$ umask 0077

Affected versions: ["6.0.3.4", "6.0.3.3", "6.0.3.2", "6.0.3.1", "6.0.3", "6.0.3.rc1", "6.0.2.2", "6.0.2.1", "6.0.2", "6.0.2.rc2", "6.0.2.rc1", "6.0.1", "6.0.1.rc1", "6.0.0", "6.0.0.rc2", "6.0.0.rc1", "6.0.0.beta3", "6.0.0.beta2", "6.0.0.beta1", "5.2.4.4", "5.2.4.3", "5.2.4.2", "5.2.4.1", "5.2.4", "5.2.4.rc1", "5.2.3", "5.2.3.rc1", "5.2.2.1", "5.2.2", "5.2.2.rc1", "5.2.1.1", "5.2.1", "5.2.1.rc1", "5.2.0", "6.0.3.5", "5.2.4.5", "6.0.3.6", "5.2.5", "6.0.3.7", "5.2.6", "5.2.4.6", "6.0.4", "6.0.4.1", "7.0.0.alpha2", "7.0.0.alpha1", "7.0.0.rc1", "7.0.0.rc3", "7.0.0.rc2", "6.0.4.3", "6.0.4.2", "6.0.4.4", "7.0.0", "7.0.1", "7.0.2", "7.0.2.2", "7.0.2.1", "6.0.4.6", "6.0.4.5", "5.2.6.2", "5.2.6.1", "7.0.2.3", "6.0.4.7", "5.2.6.3", "5.2.7", "7.0.2.4", "6.0.4.8", "5.2.7.1", "7.0.3", "6.0.5", "5.2.8", "7.0.3.1", "6.0.5.1", "5.2.8.1", "7.0.4", "6.0.6", "7.0.4.1", "6.0.6.1", "7.0.4.2", "7.0.4.3", "7.0.5", "7.0.5.1", "7.0.6", "7.0.7"]
Secure versions: [7.0.7.2, 7.0.7.1, 6.1.7.6, 6.1.7.5, 7.0.8, 7.1.0.beta1, 7.1.0.rc1, 7.1.0.rc2, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.3.2, 7.1.3.1, 7.0.8.1, 6.1.7.7, 7.1.3.3, 7.0.8.2, 7.0.8.3, 7.2.0.beta1, 7.2.0.beta2, 7.1.3.4, 7.0.8.4, 6.1.7.8, 7.2.0.beta3, 7.2.0.rc1, 7.2.0, 7.2.1, 7.1.4, 8.0.0.beta1, 7.2.1.1, 7.1.4.1, 7.0.8.5, 6.1.7.9, 8.0.0.rc1, 7.2.1.2, 7.1.4.2, 7.0.8.6, 6.1.7.10, 8.0.0.rc2, 7.2.2, 7.1.5, 8.0.0]
Recommendation: Update to version 8.0.0.

477 Other Versions

Version License Security Released
8.0.0 MIT 2024-11-07 - 22:30 6 days
8.0.0.rc2 MIT 2024-10-30 - 00:31 15 days
8.0.0.rc1 MIT 2024-10-19 - 01:43 26 days
8.0.0.beta1 MIT 2024-09-26 - 15:05 about 2 months
7.2.2 MIT 2024-10-31 - 01:47 14 days
7.2.1.2 MIT 2024-10-23 - 22:34 21 days
7.2.1.1 MIT 2024-10-15 - 20:46 29 days
7.2.1 MIT 2024-08-22 - 19:45 3 months
7.2.0 MIT 2024-08-09 - 23:26 3 months
7.2.0.rc1 MIT 2024-08-06 - 17:00 3 months
7.2.0.beta3 MIT 2024-07-11 - 15:19 4 months
7.2.0.beta2 MIT 2024-06-04 - 18:14 5 months
7.2.0.beta1 MIT 2024-05-29 - 23:37 6 months
7.1.5 MIT 2024-10-31 - 01:34 14 days
7.1.4.2 MIT 2024-10-23 - 22:28 21 days
7.1.4.1 MIT 2024-10-15 - 20:39 29 days
7.1.4 MIT 2024-08-22 - 21:26 3 months
7.1.3.4 MIT 2024-06-04 - 18:00 5 months
7.1.3.3 MIT 2024-05-16 - 19:21 6 months
7.1.3.2 MIT 2024-02-21 - 21:45 9 months
7.1.3.1 MIT 2024-02-21 - 18:46 9 months
7.1.3 MIT 2024-01-16 - 22:53 10 months
7.1.2 MIT 2023-11-10 - 21:49 about 1 year
7.1.1 MIT 2023-10-11 - 22:16 about 1 year
7.1.0 MIT 2023-10-05 - 08:06 about 1 year
7.1.0.rc2 MIT 2023-10-01 - 21:59 about 1 year
7.1.0.rc1 MIT 2023-09-27 - 04:00 about 1 year
7.1.0.beta1 MIT 2023-09-13 - 00:36 about 1 year
7.0.8.6 MIT 2024-10-23 - 22:23 21 days
7.0.8.5 MIT 2024-10-15 - 20:23 29 days
7.0.8.4 MIT 2024-06-04 - 17:56 5 months
7.0.8.3 MIT 2024-05-17 - 19:52 6 months
7.0.8.2 MIT 2024-05-16 - 18:57 6 months
7.0.8.1 MIT 2024-02-21 - 18:42 9 months
7.0.8 MIT 2023-09-09 - 19:10 about 1 year
7.0.7.2 MIT 2023-08-22 - 20:10 about 1 year
7.0.7.1 MIT 2023-08-22 - 17:20 about 1 year
7.0.7 MIT 2 2023-08-09 - 23:56 over 1 year
7.0.6 MIT 2 2023-06-29 - 20:53 over 1 year
7.0.5.1 MIT 2 2023-06-26 - 21:35 over 1 year
7.0.5 MIT 2 2023-05-24 - 18:57 over 1 year
7.0.4.3 MIT 2 2023-03-13 - 18:53 over 1 year
7.0.4.2 MIT 4 2023-01-25 - 03:14 almost 2 years
7.0.4.1 MIT 4 2023-01-17 - 18:55 almost 2 years
7.0.4 MIT 6 2022-09-09 - 18:42 about 2 years
7.0.3.1 MIT 6 2022-07-12 - 17:31 over 2 years
7.0.3 MIT 6 2022-05-09 - 13:35 over 2 years
7.0.2.4 MIT 6 2022-04-26 - 19:33 over 2 years
7.0.2.3 MIT 6 2022-03-08 - 17:50 over 2 years
7.0.2.2 MIT 6 2022-02-11 - 19:43 almost 3 years
7.0.2.1 MIT 6 2022-02-11 - 18:18 almost 3 years
7.0.2 MIT 6 2022-02-08 - 23:11 almost 3 years
7.0.1 MIT 6 2022-01-06 - 21:53 almost 3 years
7.0.0 MIT 6 2021-12-15 - 23:42 almost 3 years
7.0.0.rc3 MIT 3 2021-12-14 - 23:04 almost 3 years
7.0.0.rc2 MIT 3 2021-12-14 - 19:39 almost 3 years
7.0.0.rc1 MIT 3 2021-12-06 - 21:28 almost 3 years
7.0.0.alpha2 MIT 3 2021-09-15 - 23:14 about 3 years
7.0.0.alpha1 MIT 3 2021-09-15 - 21:55 about 3 years
6.1.7.10 MIT 2024-10-23 - 21:58 21 days
6.1.7.9 MIT 2024-10-15 - 21:24 29 days
6.1.7.8 MIT 2024-06-04 - 17:55 5 months
6.1.7.7 MIT 2024-02-21 - 18:38 9 months
6.1.7.6 MIT 2023-08-22 - 20:07 about 1 year
6.1.7.5 MIT 2023-08-22 - 17:15 about 1 year
6.1.7.4 MIT 1 2023-06-26 - 21:31 over 1 year
6.1.7.3 MIT 1 2023-03-13 - 18:48 over 1 year
6.1.7.2 MIT 2 2023-01-25 - 03:23 almost 2 years
6.1.7.1 MIT 2 2023-01-17 - 18:54 almost 2 years
6.1.7 MIT 3 2022-09-09 - 18:38 about 2 years
6.1.6.1 MIT 3 2022-07-12 - 17:29 over 2 years
6.1.6 MIT 3 2022-05-09 - 13:44 over 2 years
6.1.5.1 MIT 3 2022-04-26 - 19:30 over 2 years
6.1.5 MIT 3 2022-03-10 - 21:12 over 2 years
6.1.4.7 MIT 3 2022-03-08 - 17:48 over 2 years
6.1.4.6 MIT 3 2022-02-11 - 19:41 almost 3 years
6.1.4.5 MIT 3 2022-02-11 - 18:22 almost 3 years
6.1.4.4 MIT 3 2021-12-15 - 22:52 almost 3 years
6.1.4.3 MIT 3 2021-12-14 - 23:02 almost 3 years
6.1.4.2 MIT 3 2021-12-14 - 19:45 almost 3 years
6.1.4.1 MIT 3 2021-08-19 - 16:25 about 3 years
6.1.4 MIT 3 2021-06-24 - 20:40 over 3 years
6.1.3.2 MIT 3 2021-05-05 - 15:34 over 3 years
6.1.3.1 MIT 3 2021-03-26 - 18:05 over 3 years
6.1.3 MIT 3 2021-02-17 - 18:41 over 3 years
6.1.2.1 MIT 3 2021-02-10 - 20:44 almost 4 years
6.1.2 MIT 3 2021-02-09 - 21:28 almost 4 years
6.1.1 MIT 3 2021-01-07 - 22:58 almost 4 years
6.1.0 MIT 3 2020-12-09 - 19:56 almost 4 years
6.1.0.rc2 MIT 3 2020-12-01 - 22:00 almost 4 years
6.1.0.rc1 MIT 3 2020-11-02 - 21:14 about 4 years
6.0.6.1 MIT 6 2023-01-17 - 18:52 almost 2 years
6.0.6 MIT 6 2022-09-09 - 18:31 about 2 years
6.0.5.1 MIT 6 2022-07-12 - 17:28 over 2 years
6.0.5 MIT 6 2022-05-09 - 13:50 over 2 years
6.0.4.8 MIT 6 2022-04-26 - 19:26 over 2 years
6.0.4.7 MIT 6 2022-03-08 - 17:47 over 2 years
6.0.4.6 MIT 6 2022-02-11 - 19:39 almost 3 years
6.0.4.5 MIT 6 2022-02-11 - 18:24 almost 3 years
6.0.4.4 MIT 6 2021-12-15 - 22:45 almost 3 years