ELA-1716-1 rails security update

multiple vulnerabilities

2026-05-11
Packagerails
Version2:5.2.2.1+dfsg-1+deb10u6 (buster)
Related CVEs CVE-2022-32224 CVE-2022-44566 CVE-2023-22792 CVE-2023-22795 CVE-2023-22796 CVE-2023-23913 CVE-2023-28120 CVE-2023-28362 CVE-2023-38037 CVE-2024-41128 CVE-2024-47887 CVE-2024-47889 CVE-2024-54133 CVE-2025-24293 CVE-2025-55193


Multiple vulnerabilities were discovered in Ruby on Rails, a MVC Ruby-based framework for web development. An attacker may escalate to RCE (remote code execution), launch DoS (denial-of-service) and XSS (cross-site scripting) attacks, leak sensitive content, or pollute terminal output.

In particular, this update addresses CVE-2022-32224 which targets applications leveraging YAML-serialized columns in Active Record.

Common and safe YAML serialization is handled by this fix (support for primary Ruby data types and Symbol, as well as newly-serialized HashWithIndifferentAccess objects).

However, if your application serializes other classes as YAML, see the following page to reference these classes in config.active_record.yaml_column_permitted_classes, or disable protection entirely (not recommended, at your own risks) with config.active_record.use_yaml_unsafe_load=true.
https://discuss.rubyonrails.org/t/cve-2022-32224-possible-rce-escalation-bug-with-serialized-columns-in-active-record/81017



For Debian 10 buster, these problems have been fixed in version 2:5.2.2.1+dfsg-1+deb10u6.

We recommend that you upgrade your rails packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.