[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4383-1] rails security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4383-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                   Bastien Roucariès
November 25, 2025                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : rails
Version        : 2:6.0.3.7+dfsg-2+deb11u3
CVE ID         : CVE-2022-44566 CVE-2023-28362 CVE-2023-38037 CVE-2024-41128 
                 CVE-2024-47887 CVE-2024-47888 CVE-2024-47889 CVE-2024-54133
Debian Bug     : 1030050 1051057 1051058 1085376 1089755

rails a popular server side application framework was affected by multiple
vulnerabilities.

CVE-2022-44566

    Given a value outside the range for a 64bit signed integer type
    PostgreSQL will treat the column type as numeric. Comparing
    integer values against numeric values can result in a slow
    sequential scan.
    This behavior is configurable via
    ActiveRecord::Base.raise_int_wider_than_64bit which
    defaults to true.

CVE-2023-28362

    The redirect_to method in Rails allows provided values
    to contain characters which are not legal in an HTTP header
    value. This results in the potential for downstream services
    which enforce RFC compliance on HTTP response headers to remove
    the assigned Location header.

CVE-2023-38037

    ActiveSupport::EncryptedFile writes contents that will be
    encrypted to a temporary file. The temporary file's permissions
    are defaulted to the user's current `umask` settings, meaning
    that it's possible for other users on the same system to read
    the contents of the temporary file. Attackers that have access
    to the file system could possibly read the contents of this
    temporary file while a user is editing it

CVE-2024-41128

    Action Pack is a framework for handling and responding
    to web requests. There is a possible ReDoS vulnerability in
    the query parameter filtering routines of Action Dispatch.
    Carefully crafted query parameters can cause query parameter
    filtering to take an unexpected amount of time, possibly
    resulting in a DoS vulnerability.

CVE-2024-47887

    Action Pack is a framework for handling and responding
    to web requests. There is a possible ReDoS vulnerability in
    Action Controller's HTTP Token authentication.
    For applications using HTTP Token authentication via
    `authenticate_or_request_with_http_token` or similar,
    a carefully crafted header may cause header parsing
    to take an unexpected amount of time, possibly resulting
    in a DoS vulnerability

CVE-2024-47888

    Action Text brings rich text content and editing to Rails.
    There is a possible ReDoS vulnerability in the
    `plain_text_for_blockquote_node helper` in Action Text.
    Carefully crafted text can cause the `plain_text_for_blockquote_node`
    helper to take an unexpected amount of time,
    possibly resulting in a DoS vulnerability.

CVE-2024-47889

    Action Mailer is a framework for designing email service layers.
    There is a possible ReDoS vulnerability in the block_format helper
    in Action Mailer. Carefully crafted text can cause the block_format
    helper to take an unexpected amount of time, possibly
    resulting in a DoS vulnerability.

CVE-2024-54133

    Action Pack is a framework for handling and responding
    to web requests. There is a possible Cross Site Scripting (XSS)
    vulnerability in the `content_security_policy` helper.
    Applications which set Content-Security-Policy (CSP) headers dynamically
    from untrusted user input may be vulnerable to carefully crafted
    inputs being able to inject new directives into the CSP.
    This could lead to a bypass of the CSP and its protection
    against XSS and other attacks

For Debian 11 bullseye, these problems have been fixed in version
2:6.0.3.7+dfsg-2+deb11u3.

We recommend that you upgrade your rails packages.

For the detailed security status of rails please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/rails

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=atwX
-----END PGP SIGNATURE-----


Reply to: