Your message dated Wed, 09 Jan 2013 21:02:55 +0000
with message-id <[email protected]>
and subject line Bug#697790: fixed in ruby-activesupport-3.2 3.2.6-5
has caused the Debian Bug report #697790,
regarding rails: CVE-2013-0156: Multiple vulnerabilities in parameter parsing
in Action Pack
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
697790: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697790
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: rails
Version: 2:2.3.14.2
Severity: grave
Tags: security
http://www.openwall.com/lists/oss-security/2013/01/08/14
https://groups.google.com/forum/#!topic/rubyonrails-security/61bkgvnSGTQ/discussion
"""
Multiple vulnerabilities in parameter parsing in Action Pack
There are multiple weaknesses in the parameter parsing code for Ruby on Rails
which allows attackers to bypass authentication systems, inject arbitrary SQL,
inject and execute arbitrary code, or perform a DoS attack on a Rails
application. This vulnerability has been assigned the CVE identifier
CVE-2013-0156.
Versions Affected: ALL versions
Not affected: NONE
Fixed Versions: 3.2.11, 3.1.10, 3.0.19, 2.3.15
<snip>
"""
This probably affects squeeze and wheezy too. Please contact me in case you
need any help!
- Henri Salo
--- End Message ---
--- Begin Message ---
Source: ruby-activesupport-3.2
Source-Version: 3.2.6-5
We believe that the bug you reported is fixed in the latest version of
ruby-activesupport-3.2, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Antonio Terceiro <[email protected]> (supplier of updated
ruby-activesupport-3.2 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 09 Jan 2013 17:23:52 -0300
Source: ruby-activesupport-3.2
Binary: ruby-activesupport-3.2
Architecture: source all
Version: 3.2.6-5
Distribution: unstable
Urgency: high
Maintainer: Debian Ruby Extras Maintainers
<[email protected]>
Changed-By: Antonio Terceiro <[email protected]>
Description:
ruby-activesupport-3.2 - Support and utility classes used by the Rails 3.2
framework
Closes: 697790
Changes:
ruby-activesupport-3.2 (3.2.6-5) unstable; urgency=high
.
* debian/patches/CVE-2013-0156.patch: fix for vulnerabilities in
vulnerabilities in parameter parsing [CVE-2013-0156] (Closes: #697790)
Checksums-Sha1:
d882bfedcb73766000f8cbef2b6977753afd35e9 1566
ruby-activesupport-3.2_3.2.6-5.dsc
19cf7b7f028b438c84662c418e065f71963b17aa 4406
ruby-activesupport-3.2_3.2.6-5.debian.tar.gz
47ac83f196ab6fa7fd24931e4f3e72ab6734dfd7 322664
ruby-activesupport-3.2_3.2.6-5_all.deb
Checksums-Sha256:
25fe13f27d7a2cf9acee3681e56fce15a8439f277d461dac132ec7a64ac11f99 1566
ruby-activesupport-3.2_3.2.6-5.dsc
83a0bd34f199dee2147c3d7efe720cfa4bade96e7d957b2ec6c9eeeb2527e9e1 4406
ruby-activesupport-3.2_3.2.6-5.debian.tar.gz
76c6aee03a65cf268f48527ea0bbc36c91304e4f571f647926d055f01e03f4c0 322664
ruby-activesupport-3.2_3.2.6-5_all.deb
Files:
c16eb6bc65c98aec2486a1681841d25b 1566 ruby optional
ruby-activesupport-3.2_3.2.6-5.dsc
a02b25557c7aae418b8e414a5b425317 4406 ruby optional
ruby-activesupport-3.2_3.2.6-5.debian.tar.gz
87ad935ed7067b88c8c01f57a08261cf 322664 ruby optional
ruby-activesupport-3.2_3.2.6-5_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAlDt1lEACgkQDOM8kQ+cso+nuQCgl8fwabi1r95Q9nLjrT4p1Vv4
t7IAoKo+KNP2AlM6IpFXzqeQyWzQUa4S
=XaIE
-----END PGP SIGNATURE-----
--- End Message ---