[Git][security-tracker-team/security-tracker][master] Track fixed version for rails issues via unstable
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Mar 26 06:21:33 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
b305563a by Salvatore Bonaccorso at 2023-03-26T07:20:59+02:00
Track fixed version for rails issues via unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -2481,7 +2481,7 @@ CVE-2023-28121
RESERVED
CVE-2023-28120
RESERVED
- - rails <unfixed> (bug #1033262)
+ - rails 2:6.1.7.3+dfsg-1 (bug #1033262)
NOTE: https://github.com/rails/rails/commit/3cf23c3f891e2e81c977ea4ab83b62bc2a444b70 (v6.1.7.3)
NOTE: https://discuss.rubyonrails.org/t/cve-2023-28120-possible-xss-security-vulnerability-in-safebuffer-bytesplice/82469
CVE-2023-1348
@@ -14224,7 +14224,7 @@ CVE-2023-23914 (A cleartext transmission of sensitive information vulnerability
NOTE: https://github.com/curl/curl/pull/10138
CVE-2023-23913
RESERVED
- - rails <unfixed> (bug #1033263)
+ - rails 2:6.1.7.3+dfsg-1 (bug #1033263)
NOTE: https://github.com/rails/rails/commit/5037a13614d71727af8a175063bcf6ba1a74bdbd (v6.1.7.3)
NOTE: https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-rails-ujs-for-contenteditable-html-elements/82468
CVE-2023-23912 (A vulnerability, found in EdgeRouters Version 2.0.9-hotfix.5 and earli ...)
@@ -17809,17 +17809,17 @@ CVE-2023-22797 (An open redirect vulnerability is fixed in Rails 7.0.4.1 with th
NOTE: https://discuss.rubyonrails.org/t/cve-2023-22797-possible-open-redirect-vulnerability-in-action-pack/82120
CVE-2023-22796 (A regular expression based DoS vulnerability in Active Support <6.1 ...)
{DSA-5372-1}
- - rails <unfixed> (bug #1030050)
+ - rails 2:6.1.7.3+dfsg-1 (bug #1030050)
NOTE: https://discuss.rubyonrails.org/t/cve-2023-22796-possible-redos-based-dos-vulnerability-in-active-supports-underscore/82116
NOTE: https://github.com/rails/rails/commit/4b383e6936d7a72b5dc839f526c9a9aeb280acae (6-1-stable)
CVE-2023-22795 (A regular expression based DoS vulnerability in Action Dispatch <6. ...)
{DSA-5372-1}
- - rails <unfixed> (bug #1030050)
+ - rails 2:6.1.7.3+dfsg-1 (bug #1030050)
NOTE: https://discuss.rubyonrails.org/t/cve-2023-22795-possible-redos-based-dos-vulnerability-in-action-dispatch/82118
NOTE: https://github.com/rails/rails/commit/484fc9185db6c6a6a49ab458b11f9366da02bab2 (6-1-stable)
CVE-2023-22794 (A vulnerability in ActiveRecord <6.0.6.1, v6.1.7.1 and v7.0.4.1 rel ...)
{DSA-5372-1}
- - rails <unfixed> (bug #1030050)
+ - rails 2:6.1.7.3+dfsg-1 (bug #1030050)
[buster] - rails <not-affected> (Only affects 6.x and later)
NOTE: https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117
NOTE: https://github.com/rails/rails/commit/048e9fc05e18c91838a44e60175e475de8b2aad5 (6-1-stable)
@@ -17827,7 +17827,7 @@ CVE-2023-22793
RESERVED
CVE-2023-22792 (A regular expression based DoS vulnerability in Action Dispatch <6. ...)
{DSA-5372-1}
- - rails <unfixed> (bug #1030050)
+ - rails 2:6.1.7.3+dfsg-1 (bug #1030050)
NOTE: https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerability-in-action-dispatch/82115
NOTE: https://github.com/rails/rails/commit/7a7f37f146aa977350cf914eba20a95ce371485f (6-1-stable)
CVE-2023-22791
@@ -32710,7 +32710,7 @@ CVE-2022-44568
CVE-2022-44567 (A command injection vulnerability exists in Rocket.Chat-Desktop <3. ...)
NOT-FOR-US: Rocket.Chat-Desktop
CVE-2022-44566 (A denial of service vulnerability present in ActiveRecord's PostgreSQL ...)
- - rails <unfixed> (bug #1030050)
+ - rails 2:6.1.7.3+dfsg-1 (bug #1030050)
NOTE: https://discuss.rubyonrails.org/t/cve-2022-44566-possible-denial-of-service-vulnerability-in-activerecords-postgresql-adapter/82119
NOTE: https://github.com/rails/rails/commit/414eb337d142a9c61d7723ceb9b7c1ab30dff3ed (6-1-stable)
CVE-2022-44565 (An improper access validation vulnerability exists in airMAX AC <8. ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b305563ad0788c970d3bcc55269b18b401daeef1
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b305563ad0788c970d3bcc55269b18b401daeef1
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230326/6958cfde/attachment.htm>
More information about the debian-security-tracker-commits
mailing list