Back to bug 2064747

Who When What Removed Added
Patrick Del Bello 2022-03-16 13:28:48 UTC Depends On 2064748
Patrick Del Bello 2022-03-16 13:29:54 UTC Blocks 2064750
Vipul Nair 2022-03-22 08:43:13 UTC Depends On 2066631, 2066632, 2066633
Borja Tarraso 2022-05-31 12:20:34 UTC Fixed In Version rails-7.0.2.3 rails-6.1.4.7 rails-6.0.4.7 rails-5.2.6.3
Doc Text A flaw was found in Active Storage module of Rails where the transformation method or its arguments for image_processing are not trusted arbitrary input. An attacked could take advantage of this by injecting code in Rails.
Borja Tarraso 2022-05-31 12:21:05 UTC Doc Text A flaw was found in Active Storage module of Rails where the transformation method or its arguments for image_processing are not trusted arbitrary input. An attacked could take advantage of this by injecting code in Rails. A flaw was found in Active Storage module of Rails where the transformation method or its arguments for image_processing are not trusted arbitrary input. An attacker could take advantage of this by injecting code in Rails.
RaTasha Tillery-Smith 2022-05-31 13:50:36 UTC Doc Text A flaw was found in Active Storage module of Rails where the transformation method or its arguments for image_processing are not trusted arbitrary input. An attacker could take advantage of this by injecting code in Rails. A flaw was found in the Active Storage module of Rails, where the transformation method or its arguments for image_processing are not trusted arbitrary input. This flaw allows an attacker to inject code in Rails.
Borja Tarraso 2022-06-02 06:07:50 UTC Fixed In Version rails-7.0.2.3 rails-6.1.4.7 rails-6.0.4.7 rails-5.2.6.3 rails-7.0.2.3, rails-6.1.4.7, rails-6.0.4.7, rails-5.2.6.3
Red Hat Bugzilla 2022-07-18 09:51:12 UTC CC mmccune
Red Hat Bugzilla 2023-03-02 08:27:39 UTC CC myarboro
Red Hat Bugzilla 2023-05-15 20:18:54 UTC CC btotty
Red Hat Bugzilla 2023-07-07 08:28:47 UTC Assignee security-response-team nobody

Back to bug 2064747