Package: rails / 2:5.2.2.1+dfsg-1+deb10u3
Metadata
Package | Version | Patches format |
---|---|---|
rails | 2:5.2.2.1+dfsg-1+deb10u3 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 Be careful with that bundler.patch | (download) |
railties/lib/rails/generators/app_base.rb |
5 2 + 3 - 0 ! |
be careful with that bundler |
0002 disable uglify in activestorage rollup config js.patch | (download) |
activestorage/rollup.config.js |
16 10 + 6 - 0 ! |
rollup-plugin-uglify is not packaged, hence disabling it. |
CVE 2020 5267.patch | (download) |
actionview/lib/action_view/helpers/javascript_helper.rb |
6 4 + 2 - 0 ! |
fix possible xss vector in js escape helper This commit escapes dollar signs and backticks to prevent JS XSS issues when using the `j` or `javascript_escape` helper |
CVE 2020 8165.patch | (download) |
activesupport/lib/active_support/cache/mem_cache_store.rb |
14 2 + 12 - 0 ! |
[patch] activesupport: deprecate marshal.load on raw cache read in RedisCacheStore |
CVE 2020 8162.patch | (download) |
activestorage/lib/active_storage/service/s3_service.rb |
3 2 + 1 - 0 ! |
[patch] include content-length in signature for activestorage direct upload [CVE-2020-8162] |
CVE 2020 8164.patch | (download) |
actionpack/lib/action_controller/metal/strong_parameters.rb |
2 2 + 0 - 0 ! |
[patch] return self when calling #each, #each_pair, and #each_value instead of the raw @parameters hash [CVE-2020-8164] |
CVE 2020 8166.patch | (download) |
actionpack/lib/action_controller/metal/request_forgery_protection.rb |
33 29 + 4 - 0 ! |
[patch] hmac raw csrf token before masking it, so it cannot be used to reconstruct a per-form token [CVE-2020-8166] |
CVE 2020 8167.patch | (download) |
actionview/app/assets/javascripts/rails-ujs/utils/ajax.coffee |
7 4 + 3 - 0 ! |
[patch] check that request is same-origin prior to including csrf token in XHRs [CVE-2020-8167] |
CVE 2020 15169.patch | (download) |
actionview/lib/action_view/helpers/translation_helper.rb |
13 12 + 1 - 0 ! |
[patch] fix xss vulnerability in `translate` helper Prior to this commit, when a translation key indicated that the translation text was HTML, the value returned by `I18n.translate` would always be marked as `html_safe`. However, the value returned by `I18n.translate` could be an untrusted value directly from `options[:default]`. This commit ensures values directly from `options[:default]` are not marked as `html_safe`. |
CVE 2021 22904.patch | (download) |
actionpack/lib/action_controller/metal/http_authentication.rb |
2 1 + 1 - 0 ! |
[patch] prevent slow regex when parsing host authorization header The old regex could take too long when parsing an authorization header, and this could potentially cause a DoS vulnerability [CVE-2021-22904] |
CVE 2021 22885.patch | (download) |
actionpack/lib/action_dispatch/routing/polymorphic_routes.rb |
12 8 + 4 - 0 ! |
[patch] prevent string polymorphic route arguments url_for supports building polymorphic URLs via an array of arguments (usually symbols and records). If an array is passed, strings can result in unwanted route helper calls. CVE-2021-22885 |
CVE 2021 22880.patch | (download) |
activerecord/lib/active_record/connection_adapters/postgresql/oid/money.rb |
4 2 + 2 - 0 ! |
[patch] make currency symbols optional for money column type in PostgreSQL |