On Wed, 16 Sep 2009 02:47:38 am Steffen Joeris wrote:
> ------------------------------------------------------------------------
> Debian Security Advisory DSA-1887-1                  [email protected]
> http://www.debian.org/security/                      Steffen Joeris
> September 15, 2009                    http://www.debian.org/security/faq
> ------------------------------------------------------------------------
> 
> Package        : rails
> Vulnerability  : missing input sanitising
> Problem type   : remote
> Debian-specific: no
> CVE Id         : CVE-2009-3009
> Debian Bug     : 545063
> 
> 
> Brian Mastenbrook discovered that rails, the MVC ruby based framework
> geared for web application development, is prone to cross-site scripting
> attacks via malformed strings in the form helper.
> 
> 
> For the stable distribution (lenny), this problem has been fixed in
> version 2.1.0-7.
> 
> For the oldstable distribution (etch) security support has been
> discontinued. It has been reported that rails in oldstable is unusable
> and several features that are affected by security issues are broken due
> to programming issues. It is highly recommended to upgrade to the
> version in stable (lenny).
A question was raised on IRC whether this was meant for this package or for 
the whole oldstable distribution.
Of course, only security support for the rails package in oldstable was 
discontinued. Also, this only happened because of the state of the package in 
oldstable.
Anyway, this should be clear, but I thought I'd clarify it.

Cheers
Steffen

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to