Summary: | <dev-ruby/rails-{4.0.8, 4.1.5}: Security Permission Bypass Vulnerability (CVE-2014-3514) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Hans de Graaff <graaff> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | ruby |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://weblog.rubyonrails.org/2014/8/18/Rails_4_0_9_and_4_1_5_have_been_released/ | ||
Whiteboard: | ~3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Hans de Graaff
![]() ![]() Rails 4.0.9 and 4.1.5 are now available in the tree. Are you ready to stabilize now, or do you need some time for testing? (In reply to Yury German from comment #2) > Are you ready to stabilize now, or do you need some time for testing? No stable version(s). We don't need to stabilize. Cleanup done. CVE-2014-3514 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3514): activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls. Maintainer(s), Thank you for cleanup! No GLSA needed as there are no stable versions. |