-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.0241
                           rails security update
                              1 February 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rails
Publisher:         Debian
Operating System:  Debian GNU/Linux 7
                   Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated      
                   Denial of Service      -- Remote/Unauthenticated      
                   Cross-site Scripting   -- Remote with User Interaction
                   Reduced Security       -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-0753 CVE-2016-0752 CVE-2016-0751
                   CVE-2015-7581 CVE-2015-7577 CVE-2015-7576
                   CVE-2015-3227 CVE-2015-3226 

Original Bulletin: 
   http://www.debian.org/security/2016/dsa-3464

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running rails check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-3464-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
January 31, 2016                      https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : rails
CVE ID         : CVE-2015-3226 CVE-2015-3227 CVE-2015-7576 CVE-2015-7577 
                 CVE-2015-7581 CVE-2016-0751 CVE-2016-0752 CVE-2016-0753

Multiple security issues have been discovered in the Rails on Rails web
application development framework, which may result in denial of service,
cross-site scripting, information disclosure or bypass of input
validation.

For the stable distribution (jessie), these problems have been fixed in
version 2:4.1.8-1+deb8u1.

For the unstable distribution (sid), these problems have been fixed in
version 2:4.2.5.1-1.

We recommend that you upgrade your rails packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCAAGBQJWrlW7AAoJEBDCk7bDfE429bsQAJbxqXoQMEjnr8jd1I6zfWlF
0rn734+1IKDIPmtRa7bXVqm/WGIRc6hzLq2xfeWsFD7eH2yxNAEEFELGye8SaAMW
Z6rdXudmXDsRv/H7uKcWPftqL2rJZO4/CJRbOW5cTmSKMgMBcTYxE9zAxaHzEH9D
JJ3zjipJbncsCscyEcAFXt0nktMzKpQPnAgQ9nwSo6k9U2LLPBx8LNpokjIPH6SU
0p9uxc9q3ct0O9kEWCU6JDUGgSjaSbLE21buT5QRqkqUtdp5ZW0u6qTH8fT2es7H
e4EYZTJLLxw65qSmvFjoxFPRZbP2mv5wz+6zEq3Dn2zILlbyQZ/07Cgt8O935535
LMwGx9lXLHoH8RlyWQ9xkip2s5ltPJltRRWvVjA5CL1m/NQefnpi82VmTXgwnCxh
uce0rktFdxKuKIvIm5bX98Eyh/2RfQ0apd6UxpJG/8OmLdHGWeCGG5CBvLw+FEVB
+S17dr1+Gsg0U2ac1jcd5kDbn9eUR+8D6CIzPdpQHSrEaNezsb3KyOn1k8Dde9a/
SyMQhpBt1Ua9Fl2tJAJHIu4t1nsBlhKw6XYND6ER4vKjYK5l12VUbEvn1ZLqapSn
/0CcT2An7UKqZR23LefxckVF1iAPnjuliTO2VL5rGdYxE7xm9GZh5ME8jxqw8EWC
+s3gAMfwSdOGdT8+0g1s
=Pmrh
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=CmUS
-----END PGP SIGNATURE-----