git: 066d3dbe5cca - main - security/vuxml: Document rails vulnerability

Po-Chuan Hsieh sunpoet at FreeBSD.org
Fri May 7 09:55:10 UTC 2021


The branch main has been updated by sunpoet:

URL: https://cgit.FreeBSD.org/ports/commit/?id=066d3dbe5cca34958c37627ee2a0363f118d2ecd

commit 066d3dbe5cca34958c37627ee2a0363f118d2ecd
Author:     Po-Chuan Hsieh <sunpoet at FreeBSD.org>
AuthorDate: 2021-05-07 09:27:26 +0000
Commit:     Po-Chuan Hsieh <sunpoet at FreeBSD.org>
CommitDate: 2021-05-07 09:52:53 +0000

    security/vuxml: Document rails vulnerability
---
 security/vuxml/vuln.xml | 47 +++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 47 insertions(+)

diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 8b5747c6b00b..7f163ca321b3 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -76,6 +76,53 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="f7a00ad7-ae75-11eb-8113-08002728f74c">
+    <topic>Rails -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>rubygem-actionpack52</name>
+	<range><lt>5.2.6</lt></range>
+      </package>
+      <package>
+	<name>rubygem-actionpack60</name>
+	<range><lt>6.0.3.7</lt></range>
+      </package>
+      <package>
+	<name>rubygem-actionpack61</name>
+	<range><lt>6.1.3.2</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Ruby on Rails blog:</p>
+	<blockquote cite="https://weblog.rubyonrails.org/2021/5/5/Rails-versions-6-1-3-2-6-0-3-7-5-2-4-6-and-5-2-6-have-been-released/">
+	  <p>Rails versions 6.1.3.2, 6.0.3.7, and 5.2.6 have been released! These
+	    releases contain important security fixes. Here is a list of the issues
+	    fixed:</p>
+	  <p>CVE-2021-22885: Possible Information Disclosure / Unintended Method Execution in Action Pack</p>
+	  <p>CVE-2021-22902: Possible Denial of Service vulnerability in Action Dispatch</p>
+	  <p>CVE-2021-22903: Possible Open Redirect Vulnerability in Action Pack</p>
+	  <p>CVE-2021-22904: Possible DoS Vulnerability in Action Controller Token Authentication</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://weblog.rubyonrails.org/2021/5/5/Rails-versions-6-1-3-2-6-0-3-7-5-2-4-6-and-5-2-6-have-been-released/</url>
+      <url>https://discuss.rubyonrails.org/t/cve-2021-22885-possible-information-disclosure-unintended-method-execution-in-action-pack/77868</url>
+      <url>https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866</url>
+      <url>https://discuss.rubyonrails.org/t/cve-2021-22903-possible-open-redirect-vulnerability-in-action-pack/77867</url>
+      <url>https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869</url>
+      <cvename>CVE-2021-22885</cvename>
+      <cvename>CVE-2021-22902</cvename>
+      <cvename>CVE-2021-22903</cvename>
+      <cvename>CVE-2021-22904</cvename>
+    </references>
+    <dates>
+      <discovery>2021-05-05</discovery>
+      <entry>2021-05-07</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="7f242313-aea5-11eb-8151-67f74cf7c704">
     <topic>go -- net/http: ReadRequest can stack overflow due to recursion with very large headers</topic>
     <affects>


More information about the dev-commits-ports-all mailing list