Conversation
Please check https://makandracards.com/railslts/474590-list-cves-addressed-rails-lts for all CVEs addressed by Rails LTS and detailed information.
|
First, I will need some kind of confirmation that this is indeed Niklas Häusele speaking on behalf of Rails LTS / Makandra, and not some random GitHub account possibly posing as Niklas Häusele. Second, the Rails LTS patched versions were added by PR #538. If we remove the Rails LTS specific patched versions, then |
postmodern
left a comment
There was a problem hiding this comment.
Looks good, but also needs a note added to the README instructing Rails LTS users to check the official Rails LTS CVE list, and to add those CVEs to their .bundler-audit.yml file under ignore:.
|
Monitoring PR and will make changes to my GHSA SYNC scripts after the merge. |
|
Thank you @postmodern for taking a look. I sent you an email to your linked GitHub profile address regarding verification. I'll update the PR accordingly 👍 |
|
Added a note to the README in eb74560. |
We (the Rails LTS team) noticed that some CVEs are marked as fixed by Rails LTS in the ruby-advisory-db. While we appreciate and are grateful for the effort, we would prefer not to list our commercial versions in the official database as fixed versions.
Currently, we do not have the capacity to actively monitor all versions listed in the ruby-advisory-db, verify their accuracy, and ensure correctness. Additionally, some fixes require extra context or additional information that may not be adequately reflected in the database. Most Rails LTS versions are a commercial offering, and we maintain a comprehensive list of all CVEs we have addressed—along with the necessary details—at https://makandracards.com/railslts/474590-list-cves-addressed-rails-lts. Every Rails LTS customer also receives a newsletter with updates and additional information for all patches.
We would prefer to keep our own documentation as the single source of truth for Rails LTS related fixes. Thank you for your understanding.