This article explains how the vulnerability works, how it is triggered and 
what the facts 
are: 
http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/

On Wednesday, January 2, 2013 10:28:36 PM UTC+1, Aaron Patterson wrote:
>
> Rails versions 3.2.10, 3.1.9, and 3.0.18 have been released.  These 
> releases contain an important security fix.  It is recommended that **all 
> users upgrade immediately**. 
>
> The security identifier is CVE-2012-5664, and you can read about the issue 
> [here](add link). 
>
> For other change in each particular release, please see the CHANGELOG 
> corresponding to that version.  For all commits in each release, please 
> follow the links below: 
>
> * [Changes in 3.2.10](
> https://github.com/rails/rails/compare/v3.2.9...v3.2.10) 
> * [Changes in 3.1.9](
> https://github.com/rails/rails/compare/v3.1.8...v3.1.9) 
> * [Changes in 3.0.18](
> https://github.com/rails/rails/compare/v3.0.17...v3.0.18) 
>
> We're sorry to drop a release like this so close to the holidays but 
> regrettably the exploit has already been publicly disclosed and we don't 
> feel we can delay the release. 
>
> To that end, we've minimized the number of changes in each release so that 
> upgrading should be as smooth as possible. 
>
> Happy Holidays! 
>
> <3<3<3 
>
> -- 
> Aaron Patterson 
> http://tenderlovemaking.com/ 
>

-- 
You received this message because you are subscribed to the Google Groups "Ruby 
on Rails: Talk" group.
To post to this group, send email to rubyonrails-talk@googlegroups.com.
To unsubscribe from this group, send email to 
rubyonrails-talk+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msg/rubyonrails-talk/-/y4QH7gOKNnoJ.
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to