[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20090915164738.29D69AB0029@hannah.localdomain>
Date: Wed, 16 Sep 2009 02:47:38 +1000 (EST)
From: white@...ian.org (Steffen Joeris)
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 1887-1] New rails packages fix
cross-site scripting
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1887-1 security@...ian.org
http://www.debian.org/security/ Steffen Joeris
September 15, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : rails
Vulnerability : missing input sanitising
Problem type : remote
Debian-specific: no
CVE Id : CVE-2009-3009
Debian Bug : 545063
Brian Mastenbrook discovered that rails, the MVC ruby based framework
geared for web application development, is prone to cross-site scripting
attacks via malformed strings in the form helper.
For the stable distribution (lenny), this problem has been fixed in
version 2.1.0-7.
For the oldstable distribution (etch) security support has been
discontinued. It has been reported that rails in oldstable is unusable
and several features that are affected by security issues are broken due
to programming issues. It is highly recommended to upgrade to the
version in stable (lenny).
For the testing distribution (squeeze) and the unstable distribution
(sid), this problem has been fixed in version 2.2.3-1.
We recommend that you upgrade your rails packages.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Debian (stable)
- ---------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/r/rails/rails_2.1.0-7.diff.gz
Size/MD5 checksum: 17520 866f4225a0496c3a2fbeae5da52b36a9
http://security.debian.org/pool/updates/main/r/rails/rails_2.1.0-7.dsc
Size/MD5 checksum: 1203 60d2bd20b3dae00c2675ed1d45ee99af
http://security.debian.org/pool/updates/main/r/rails/rails_2.1.0.orig.tar.gz
Size/MD5 checksum: 1953333 edcc03e7177e1557653fcb92c90db0d1
Architecture independent packages:
http://security.debian.org/pool/updates/main/r/rails/rails_2.1.0-7_all.deb
Size/MD5 checksum: 2374598 0a1648b6ff0105c4969f54f8c8bed8af
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkqvxQUACgkQ62zWxYk/rQepTACeMylU2PMJePwDfaGAAGFLLP6s
Rz0AoLvIQHNfBsLVmXXG8xF9b5gsA+23
=tRi9
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists