Skip to content

Bump the bundler group across 2 directories with 4 updates#1

Open
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/bundler/sample-ruby/bundler-f2d154f27f
Open

Bump the bundler group across 2 directories with 4 updates#1
dependabot[bot] wants to merge 1 commit intomasterfrom
dependabot/bundler/sample-ruby/bundler-f2d154f27f

Conversation

@dependabot
Copy link
Copy Markdown

@dependabot dependabot bot commented on behalf of github Mar 5, 2026

Bumps the bundler group with 2 updates in the /sample-ruby directory: sinatra and webrick.
Bumps the bundler group with 2 updates in the /sample-functions-framework-ruby directory: rack and puma.

Updates sinatra from 2.2.3 to 4.2.0

Changelog

Sourced from sinatra's changelog.

4.2.0 / 2025-10-08

  • New: Add :static_headers setting for custom headers in static file responses (#2089)
  • Fix: Fix regex in etag_matches? to prevent ReDoS (#2121)
  • Fix: PATH_INFO can never be empty (#2114)
  • Fix: Fix malformed Content-Type headers (#2081)
  • Fix: Avoid crash for integer values in content_type parameters (#2078)

4.1.1 / 2024-11-20

  • Fix: Restore WEBrick support (#2067)

4.1.0 / 2024-11-18

  • New: Add host_authorization setting (#2053)
    • Defaults to .localhost, .test and any IP address in development mode.
    • Security: addresses CVE-2024-21510.
  • Fix: Return an instance of Sinatra::IndifferentHash when calling #except (#2044)
  • Fix: Address warning from URI for Ruby 3.4 (#2060)
  • Fix: rackup no longer depends on WEBrick, recommend Puma instead (4a558503)
  • Fix: Zeitwerk 2.7.0+ compatibility (#2050)
  • Fix: Address warning about Hash construction for Ruby 3.4 (#2028)
  • Fix: Declare missing dependencies for Ruby 3.5 (#2032)
  • Fix: Compatibility with --enable-frozen-string-literal (#2033)
  • Fix: Rack 3.1 compatibility (#2035)
    • Don't depend on Rack::Logger
    • Don't delete content-length header when Rack::Files is used

4.0.1 / 2025-05-24

  • Rack 3.1 compatibility (#2035)

  • Fix malformed Content-Type headers (#2081)

  • Avoid crash for integer values in content_type parameters (#2078)

  • Fix compatibility with --enable-frozen-string-literal (#2033)

  • Declare missing dependencies for Ruby 3.5 (#2032)

  • Fix warning about Hash construction. (#2028)

  • Support Zeitwerk 2.7.0+ (#2050)

  • Address URI depreciation (#2060)

#2035: sinatra/sinatra#2035 #2081: sinatra/sinatra#2081 #2078: sinatra/sinatra#2078 #2033: sinatra/sinatra#2033

... (truncated)

Commits

Updates webrick from 1.7.0 to 1.8.2

Release notes

Sourced from webrick's releases.

v1.8.2

What's Changed

New Contributors

Full Changelog: ruby/webrick@v1.8.1...v1.8.2

v1.8.1

What's Changed

Full Changelog: ruby/webrick@v1.8.0...v1.8.1

v1.8.0

What's Changed

... (truncated)

Commits
  • 0fb9de6 Bump up v1.8.2
  • b9a4c81 Removed trailing spaces
  • f5faca9 Prevent request smuggling
  • 0c600e1 Fix reference to URI::REGEXP::PATTERN::HOST
  • 15a9391 Return 400 response for chunked requests with unexpected data after chunk
  • 2b38d56 Treat missing CRLF separator after headers as an EOFError
  • e4efb4a Remove unnecessary gsub calls in test_httprequest.rb
  • 426e214 Only strip space and horizontal tab in headers
  • e72cb69 Prefer squigly heredocs. (#143)
  • ee60354 Require CRLF line endings in request line and headers
  • Additional commits viewable in compare view

Updates rack from 2.2.8 to 3.2.5

Release notes

Sourced from rack's releases.

v2.2.8.1

What's Changed

Full Changelog: rack/rack@v2.2.8...v2.2.8.1

v2.2.8

What's Changed

New Contributors

Full Changelog: rack/rack@v2.2.7...v2.2.8

v2.2.7

What's Changed

New Contributors

Full Changelog: rack/rack@v2.2.6.4...v2.2.7

Changelog

Sourced from rack's changelog.

Changelog

All notable changes to this project will be documented in this file. For info on how to format all future additions to this file please reference Keep A Changelog.

Unreleased

Security

  • CVE-2025-61780 Improper handling of headers in Rack::Sendfile may allow proxy bypass.
  • CVE-2025-61919 Unbounded read in Rack::Request form parsing can lead to memory exhaustion.
  • CVE-2026-25500 XSS injection via malicious filename in Rack::Directory.
  • CVE-2026-22860 Directory traversal via root prefix bypass in Rack::Directory.

SPEC Changes

Added

  • Add Rack::Files#assign_headers to allow overriding how the configured file headers are set. (#2377, @​codergeek121)
  • Add support for rack.response_finished to Rack::TempfileReaper. (#2363, @​skipkayhil)
  • Add support for streaming bodies when using Rack::Events. (#2375, @​unflxw)
  • Add deflaters option to Rack::Deflater to enable custom compression algorithms like zstd. (#2168, @​alexanderadam)
  • Add Rack::Request#prefetch? for identifying requests with Sec-Purpose: prefetch header set. (#2405, @​glaszig)
  • Add rack.request.trusted_proxy environment key to indicate whether the request is coming from a trusted proxy.

Changed

  • Raise before exceeding a part limit, not after. (#2362, @​matthew-puku)
  • Rack::Deflater now uses a fixed GZip mtime value. (#2372, @​bensheldon)
  • Multipart parser drops support for RFC 2231 filename* parameter (prohibited by RFC 7578) and now properly handles UTF-8 encoded filenames via percent-encoding and direct UTF-8 bytes. (#2398, @​wtn)
  • The query parser now raises Rack::QueryParser::IncompatibleEncodingError if we try to parse params that are not ASCII compatible. (#2416, @​bquorning)

Fixed

[3.2.4] - 2025-11-03

Fixed

  • Multipart parser: limit MIME header size check to the unread buffer region to avoid false multipart mime part header too large errors when previously read data accumulates in the scan buffer. (#2392, @​alpaca-tc, @​willnet, @​krororo)

[3.2.3] - 2025-10-10

Security

  • CVE-2025-61780 Improper handling of headers in Rack::Sendfile may allow proxy bypass.
  • CVE-2025-61919 Unbounded read in Rack::Request form parsing can lead to memory exhaustion.

... (truncated)

Commits
  • 0cc2e00 Bump patch version.
  • a5725c0 Prevent directory traversal via root prefix bypass.
  • 175e7d2 XSS injection via malicious filename in Rack::Directory.
  • 3472037 Fix changelog.
  • 851dc02 Bump patch version.
  • 1e6aeda Allow Multipart head to span read boundary. (#2392)
  • 6ef5915 Bump patch version.
  • 4e2c903 Unbounded read in Rack::Request form parsing can lead to memory exhaustion.
  • fba2c8b Improper handling of proxy headers in Rack::Sendfile may allow proxy bypass.
  • ed3d834 Normalize adivsories links.
  • Additional commits viewable in compare view

Updates rack from 2.2.6.4 to 2.2.22

Release notes

Sourced from rack's releases.

v2.2.8.1

What's Changed

Full Changelog: rack/rack@v2.2.8...v2.2.8.1

v2.2.8

What's Changed

New Contributors

Full Changelog: rack/rack@v2.2.7...v2.2.8

v2.2.7

What's Changed

New Contributors

Full Changelog: rack/rack@v2.2.6.4...v2.2.7

Changelog

Sourced from rack's changelog.

Changelog

All notable changes to this project will be documented in this file. For info on how to format all future additions to this file please reference Keep A Changelog.

Unreleased

Security

  • CVE-2025-61780 Improper handling of headers in Rack::Sendfile may allow proxy bypass.
  • CVE-2025-61919 Unbounded read in Rack::Request form parsing can lead to memory exhaustion.
  • CVE-2026-25500 XSS injection via malicious filename in Rack::Directory.
  • CVE-2026-22860 Directory traversal via root prefix bypass in Rack::Directory.

SPEC Changes

Added

  • Add Rack::Files#assign_headers to allow overriding how the configured file headers are set. (#2377, @​codergeek121)
  • Add support for rack.response_finished to Rack::TempfileReaper. (#2363, @​skipkayhil)
  • Add support for streaming bodies when using Rack::Events. (#2375, @​unflxw)
  • Add deflaters option to Rack::Deflater to enable custom compression algorithms like zstd. (#2168, @​alexanderadam)
  • Add Rack::Request#prefetch? for identifying requests with Sec-Purpose: prefetch header set. (#2405, @​glaszig)
  • Add rack.request.trusted_proxy environment key to indicate whether the request is coming from a trusted proxy.

Changed

  • Raise before exceeding a part limit, not after. (#2362, @​matthew-puku)
  • Rack::Deflater now uses a fixed GZip mtime value. (#2372, @​bensheldon)
  • Multipart parser drops support for RFC 2231 filename* parameter (prohibited by RFC 7578) and now properly handles UTF-8 encoded filenames via percent-encoding and direct UTF-8 bytes. (#2398, @​wtn)
  • The query parser now raises Rack::QueryParser::IncompatibleEncodingError if we try to parse params that are not ASCII compatible. (#2416, @​bquorning)

Fixed

[3.2.4] - 2025-11-03

Fixed

  • Multipart parser: limit MIME header size check to the unread buffer region to avoid false multipart mime part header too large errors when previously read data accumulates in the scan buffer. (#2392, @​alpaca-tc, @​willnet, @​krororo)

[3.2.3] - 2025-10-10

Security

  • CVE-2025-61780 Improper handling of headers in Rack::Sendfile may allow proxy bypass.
  • CVE-2025-61919 Unbounded read in Rack::Request form parsing can lead to memory exhaustion.

... (truncated)

Commits
  • 0cc2e00 Bump patch version.
  • a5725c0 Prevent directory traversal via root prefix bypass.
  • 175e7d2 XSS injection via malicious filename in Rack::Directory.
  • 3472037 Fix changelog.
  • 851dc02 Bump patch version.
  • 1e6aeda Allow Multipart head to span read boundary. (#2392)
  • 6ef5915 Bump patch version.
  • 4e2c903 Unbounded read in Rack::Request form parsing can lead to memory exhaustion.
  • fba2c8b Improper handling of proxy headers in Rack::Sendfile may allow proxy bypass.
  • ed3d834 Normalize adivsories links.
  • Additional commits viewable in compare view

Updates puma from 5.6.7 to 5.6.9

Changelog

Sourced from puma's changelog.

5.6.9 / 2024-09-19

  • Security
    • Discards any headers using underscores if the non-underscore version also exists. Without this, an attacker could overwrite values set by intermediate proxies (e.g. X-Forwarded-For). (CVE-2024-45614/GHSA-9hf4-67fc-4vf4)
  • JRuby
    • Must use at least Java >= 9 to compile. You can no longer build from source on Java 8.

5.6.8 / 2024-01-08

  • Security
    • Limit the size of chunk extensions. Without this limit, an attacker could cause unbounded resource (CPU, network bandwidth) consumption. (GHSA-c2f4-cvqm-65w2)
Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the bundler group with 2 updates in the /sample-ruby directory: [sinatra](https://github.com/sinatra/sinatra) and [webrick](https://github.com/ruby/webrick).
Bumps the bundler group with 2 updates in the /sample-functions-framework-ruby directory: [rack](https://github.com/rack/rack) and [puma](https://github.com/puma/puma).


Updates `sinatra` from 2.2.3 to 4.2.0
- [Changelog](https://github.com/sinatra/sinatra/blob/main/CHANGELOG.md)
- [Commits](sinatra/sinatra@v2.2.3...v4.2.0)

Updates `webrick` from 1.7.0 to 1.8.2
- [Release notes](https://github.com/ruby/webrick/releases)
- [Commits](ruby/webrick@v1.7.0...v1.8.2)

Updates `rack` from 2.2.8 to 3.2.5
- [Release notes](https://github.com/rack/rack/releases)
- [Changelog](https://github.com/rack/rack/blob/main/CHANGELOG.md)
- [Commits](rack/rack@v2.2.6.4...v2.2.22)

Updates `rack` from 2.2.6.4 to 2.2.22
- [Release notes](https://github.com/rack/rack/releases)
- [Changelog](https://github.com/rack/rack/blob/main/CHANGELOG.md)
- [Commits](rack/rack@v2.2.6.4...v2.2.22)

Updates `puma` from 5.6.7 to 5.6.9
- [Release notes](https://github.com/puma/puma/releases)
- [Changelog](https://github.com/puma/puma/blob/main/History.md)
- [Commits](puma/puma@v5.6.7...v5.6.9)

---
updated-dependencies:
- dependency-name: sinatra
  dependency-version: 4.2.0
  dependency-type: direct:production
  dependency-group: bundler
- dependency-name: webrick
  dependency-version: 1.8.2
  dependency-type: direct:production
  dependency-group: bundler
- dependency-name: rack
  dependency-version: 3.2.5
  dependency-type: indirect
  dependency-group: bundler
- dependency-name: rack
  dependency-version: 2.2.22
  dependency-type: indirect
  dependency-group: bundler
- dependency-name: puma
  dependency-version: 5.6.9
  dependency-type: indirect
  dependency-group: bundler
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file ruby Pull requests that update ruby code labels Mar 5, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file ruby Pull requests that update ruby code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants