[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] Mark rails issues as unimportante, non-issues/negliglible imapct

Salvatore Bonaccorso carnil at debian.org
Mon Jan 1 13:20:31 UTC 2018


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1b883fa9 by Salvatore Bonaccorso at 2018-01-01T14:19:18+01:00
Mark rails issues as unimportante, non-issues/negliglible imapct

All of the methods are confirmed from upstream to be designed such to
accept arbitrary SQL.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -666,23 +666,23 @@ CVE-2017-17922
 CVE-2017-17921
 	RESERVED
 CVE-2017-17920 (SQL injection vulnerability in the 'reorder' method in Ruby on Rails ...)
-	- rails <undetermined>
+	- rails <unfixed> (unimportant)
 	NOTE: https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/
-	TODO: check (and other possible earlier source packages)
+	NOTE: All of those methods accept arbitrary SQL by design.
 CVE-2017-17919 (SQL injection vulnerability in the 'order' method in Ruby on Rails ...)
-	- rails <undetermined>
+	- rails <unfixed> (unimportant)
 	NOTE: https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/
-	TODO: check (and other possible earlier source packages)
+	NOTE: All of those methods accept arbitrary SQL by design.
 CVE-2017-17918
 	RESERVED
 CVE-2017-17917 (SQL injection vulnerability in the 'where' method in Ruby on Rails ...)
-	- rails <undetermined>
+	- rails <unfixed> (unimportant)
 	NOTE: https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/
-	TODO: check (and other possible earlier source packages)
+	NOTE: All of those methods accept arbitrary SQL by design.
 CVE-2017-17916 (SQL injection vulnerability in the 'find_by' method in Ruby on Rails ...)
-	- rails <undetermined>
+	- rails <unfixed> (unimportant)
 	NOTE: https://kay-malwarebenchmark.github.io/blog/ruby-on-rails-arbitrary-sql-injection/
-	TODO: check (and other possible earlier source packages)
+	NOTE: All of those methods accept arbitrary SQL by design.
 CVE-2017-17915 (In GraphicsMagick 1.4 snapshot-20171217 Q8, there is a heap-based ...)
 	- graphicsmagick 1.3.27-3
 	NOTE: http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/1721f1b7e67a



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/1b883fa9901c215135fdc70db345986bf16e6098

---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/1b883fa9901c215135fdc70db345986bf16e6098
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180101/881f8e9c/attachment.html>


More information about the Secure-testing-commits mailing list