Bug#1030050: rails: CVE-2023-22796 CVE-2023-22795 CVE-2023-22794 CVE-2023-22792 CVE-2022-44566

2023-03-25 Thread Lucas Nussbaum
On 30/01/23 at 18:59 +0100, Moritz Mühlenhoff wrote:
> Source: rails
> X-Debbugs-CC: t...@security.debian.org
> Severity: grave
> Tags: security
> 
> Hi,
> 
> The following vulnerabilities were published for rails.

Hi,

I think that a reasonable way forward on this bug would be to upgrade
rails to version 6.1.7.3. The changelogs for the versions between
the current version in testing (6.1.7) and 6.1.7.3 are:
https://github.com/rails/rails/releases/tag/v6.1.7.1
https://github.com/rails/rails/releases/tag/v6.1.7.2
https://github.com/rails/rails/releases/tag/v6.1.7.3

The changes are only security fixes.

Also, since there are extensive tests for reverse-deps, it would probably
be reasonably safe to push that change, even at this stage of the
release cycle.

Comments?

Lucas



Bug#1030050: rails: CVE-2023-22796 CVE-2023-22795 CVE-2023-22794 CVE-2023-22792 CVE-2022-44566

2023-01-30 Thread Moritz Mühlenhoff
Source: rails
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for rails.

CVE-2023-22796[0]:
https://discuss.rubyonrails.org/t/cve-2023-22796-possible-redos-based-dos-vulnerability-in-active-supports-underscore/82116
https://github.com/rails/rails/commit/4b383e6936d7a72b5dc839f526c9a9aeb280acae 
(6-1-stable)

CVE-2023-22795[1]:
https://discuss.rubyonrails.org/t/cve-2023-22795-possible-redos-based-dos-vulnerability-in-action-dispatch/82118
https://github.com/rails/rails/commit/484fc9185db6c6a6a49ab458b11f9366da02bab2 
(6-1-stable)

CVE-2023-22794[2]:
https://discuss.rubyonrails.org/t/cve-2023-22794-sql-injection-vulnerability-via-activerecord-comments/82117
https://github.com/rails/rails/commit/048e9fc05e18c91838a44e60175e475de8b2aad5 
(6-1-stable)

CVE-2023-22792[3]:
https://discuss.rubyonrails.org/t/cve-2023-22792-possible-redos-based-dos-vulnerability-in-action-dispatch/82115
https://github.com/rails/rails/commit/7a7f37f146aa977350cf914eba20a95ce371485f 
(6-1-stable)

CVE-2022-44566[4]:
https://discuss.rubyonrails.org/t/cve-2022-44566-possible-denial-of-service-vulnerability-in-activerecords-postgresql-adapter/82119
https://github.com/rails/rails/commit/414eb337d142a9c61d7723ceb9b7c1ab30dff3ed 
(6-1-stable)


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-22796
https://www.cve.org/CVERecord?id=CVE-2023-22796
[1] https://security-tracker.debian.org/tracker/CVE-2023-22795
https://www.cve.org/CVERecord?id=CVE-2023-22795
[2] https://security-tracker.debian.org/tracker/CVE-2023-22794
https://www.cve.org/CVERecord?id=CVE-2023-22794
[3] https://security-tracker.debian.org/tracker/CVE-2023-22792
https://www.cve.org/CVERecord?id=CVE-2023-22792
[4] https://security-tracker.debian.org/tracker/CVE-2022-44566
https://www.cve.org/CVERecord?id=CVE-2022-44566

Please adjust the affected versions in the BTS as needed.