[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#546917: RM: rails/1.1.6-3



Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: rm

  On Wed, 16 Sep 2009 02:47:38 am Steffen Joeris wrote:
> ------------------------------------------------------------------------
> Debian Security Advisory DSA-1887-1                  security@debian.org
> http://www.debian.org/security/                      Steffen Joeris
> September 15, 2009                    http://www.debian.org/security/faq
> ------------------------------------------------------------------------
> 
> Package        : rails
> Vulnerability  : missing input sanitising
> Problem type   : remote
> Debian-specific: no
> CVE Id         : CVE-2009-3009
> Debian Bug     : 545063
> 
> 
> Brian Mastenbrook discovered that rails, the MVC ruby based framework
> geared for web application development, is prone to cross-site scripting
> attacks via malformed strings in the form helper.
> 
> 
> For the stable distribution (lenny), this problem has been fixed in
> version 2.1.0-7.
> 
> For the oldstable distribution (etch) security support has been
> discontinued. It has been reported that rails in oldstable is unusable
> and several features that are affected by security issues are broken due
> to programming issues. It is highly recommended to upgrade to the
> version in stable (lenny).
Please schedule rails for removal from etch in the next oldstable point 
release. According to the maintainer it is unusable.
Adam, please make sure that we can support the current rails in lenny and the 
new one in squeeze for a while (including oldstable-security support).

Cheers
Steffen



Reply to: