On Wed, 16 Sep 2009 02:47:38 am Steffen Joeris wrote: > ------------------------------------------------------------------------ > Debian Security Advisory DSA-1887-1 security@debian.org > http://www.debian.org/security/ Steffen Joeris > September 15, 2009 http://www.debian.org/security/faq > ------------------------------------------------------------------------ > > Package : rails > Vulnerability : missing input sanitising > Problem type : remote > Debian-specific: no > CVE Id : CVE-2009-3009 > Debian Bug : 545063 > > > Brian Mastenbrook discovered that rails, the MVC ruby based framework > geared for web application development, is prone to cross-site scripting > attacks via malformed strings in the form helper. > > > For the stable distribution (lenny), this problem has been fixed in > version 2.1.0-7. > > For the oldstable distribution (etch) security support has been > discontinued. It has been reported that rails in oldstable is unusable > and several features that are affected by security issues are broken due > to programming issues. It is highly recommended to upgrade to the > version in stable (lenny). A question was raised on IRC whether this was meant for this package or for the whole oldstable distribution. Of course, only security support for the rails package in oldstable was discontinued. Also, this only happened because of the state of the package in oldstable. Anyway, this should be clear, but I thought I'd clarify it. Cheers Steffen
Attachment:
signature.asc
Description: This is a digitally signed message part.