uri
gem.time
and uri
stdlibs (CVE-2023-28755, CVE-2023-28756), see
here
Show archive.org snapshot
for more detailsRack::TempfileReaper
middleware to the default middleware stack, see below.Rack::TempfileReaper
middleware.config.active_record.raise_int_wider_than_64bit = false
rails server
fail with certain web servers on Ruby 3.1.content_tag
or tag
helpers (CVE-2022-27777);
see details
Show archive.org snapshot
.script/server
command not accepting certain parameters when running with rack > 1.1.#escape_javascript
(CVE-2020-5267),
see details
Show archive.org snapshot
#escape_javascript
and #escape_json
,
see details
Show archive.org snapshot
ActiveRecord::SessionStore
to not be vulnerable to timing attacks that can lead to session hijacking (CVE-2019-16782).
see details
Show archive.org snapshot
#respond_to?
on a named scope would sometimes cause the scope to be loaded.rails new-app
. This is not a security issue.A vulnerability was disclosed for some Ruby sanitization gems like loofah (
CVE-2018-8048
Show archive.org snapshot
) and sanitize (
CVE-2018-3740
Show archive.org snapshot
). This also affects recent Rails versions, whose sanitize()
helper depends on loofah.
We have confirmed that the sanitize()
helper in Rails 2.3 is not affected by this issue.
Note that if your application uses one of the affected gems directly, you may still be affected and should update to the latest version of these gems.
#content_tag
was called with (escape = false)
.
More Details
Show archive.org snapshot
This is a bugfix release only, no security issues have been fixed.
rake rails:freeze:gems
commandMore Details Show archive.org snapshot
Backported a fix for CVE-2016-0751: Possible Object Leak and Denial of Service attack in Action Pack Show archive.org snapshot
Backported a fix for CVE-2016-0753: Possible Input Validation Circumvention in Active Model Show archive.org snapshot
More Details Show archive.org snapshot
Added support for installing LTS via our own gem server to reduce download times.
Backported a fix for Possible Denial of Service attack in Active Support (CVE-2015-3227) Show archive.org snapshot
You can now upgrade Rails LTS 2.3 to use rack
1.4. You should upgrade rack
to at least 1.4.6
to address
Potential Denial of Service Vulnerability in Rack (CVE-2015-3225)
Show archive.org snapshot
.
This release also contains two backward-compatible fixes that makes it easier to upgrade to Ruby 2.2, courtesy of Peter Lind Show archive.org snapshot . Note that using Rails 2.3 with Ruby 2+ involves considerable work and is not supported by us.
A vulnerability was discosed in all versions of Ruby.
Since Ruby 1.8.7 und Ruby 1.9.3 are no longer maintained at this time, we have provided backported fixes for CVE-2015-1855: Ruby OpenSSL Hostname Verification Show archive.org snapshot .
Please note that the Rails LTS service only covers security patches for the Rails framework. We are unable to guarantee backported security patches for Ruby 1.8.7 or 1.9.3 in the future.
Backported a fix for Arbitrary file existence disclosure in Action Pack (CVE-2014-7818) Show archive.org snapshot (2.3 was affected)
Note that was also a vulnerability affecting Sprockets Show archive.org snapshot . 2.3 does not use Sprockets by default, but you might have integrated it manually.
Backported a fix for SQL Injection Vulnerability in 'bitstring' quoting (CVE-2014-3482) Show archive.org snapshot affecting PostgreSQL users.
Note that there was also "SQL Injection Vulnerability in 'range' quoting" (CVE-2014-3483) which did not affect Rails 2.3.
Add a switch to fail on ambiguous table / column names to mitigate Unsafe Query Risk in Active Record Show archive.org snapshot .
Backported a fix for Directory Traversal Vulnerability With Certain Route Configurations (CVE-2014-0130) Show archive.org snapshot .
Backported an old security advisory Show archive.org snapshot with CVE-2012-1099 to Rails LTS.
Rails LTS now offers a version number.
Starting with today's release, you can query RailsLts::VERSION
to check which version you are using.
Applications such as Brakeman Show archive.org snapshot or Code Climate Show archive.org snapshot can make use of that information now, too.
Five security advisories were published on the official Rails security list Show archive.org snapshot :
We provided a patched version of Rails LTS for commercial plans as of today.
A vulnerability was discosed in all versions of Ruby.
Since Ruby 1.8.7 is no longer maintained at this time, we have provided a Backported fix for "Heap Overflow in Floating Point Parsing (CVE-2013-4164)".
Please note that the Rails LTS service only covers security patches for the Rails framework. We are unable to guarantee backported security patches for Ruby 1.8.7 in the future.
150 days without accident! After a storm of severe security vulnerabilities earlier this year, the Ruby on Rails framework seems to be enjoying a short respite.
We continue to monitor the
official Rails security list
Show archive.org snapshot
for new advisories.
We are now officially supporting installation without Bundler or Git.
Added missing tests that ensure fixes for CVE-2012-2660 Show archive.org snapshot , CVE-2012-2694 Show archive.org snapshot and CVE-2013-0155 Show archive.org snapshot .
Fix XSS vulnerability in the translate helper method in Ruby on Rails Show archive.org snapshot .
This vulnerability was disclosed a long time ago (in November 2011) and affects Rails 2.3 applications with the rails_xss Show archive.org snapshot plugin. However, a fix for Rails 2.3 was never released, so we have fixed this in Rails LTS.
Backported a fix for a bug Show archive.org snapshot in the built-in HTML tokenizer, which would crash for certain types of malformed HTML.
Fixed many broken tests.
Added optional switches to disable the parsing of XML params and JSON params. These are disabled by default in order to preserve compatibility with Rails 2.3.18.
The switches are enabled in hardened configuration mode.
Rails LTS is compatible with the
official Rails 2.3.18 release
Show archive.org snapshot
.
Rails LTS now contains fixes for CVE-2012-3464, CVE-2012-3465, CVE-2012-2695.