You are here
Home > Preporuke > Ranjivost programskog paketa rails

Ranjivost programskog paketa rails

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LDE

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA512

– ————————————————————————-
Debian Security Advisory DSA-3651-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
August 25, 2016 https://www.debian.org/security/faq
– ————————————————————————-

Package : rails
CVE ID : CVE-2016-6316
Debian Bug : 834155

Andrew Carpenter of Critical Juncture discovered a cross-site scripting
vulnerability affecting Action View in rails, a web application
framework written in Ruby. Text declared as “HTML safe” will not have
quotes escaped when used as attribute values in tag helpers.

For the stable distribution (jessie), this problem has been fixed in
version 2:4.1.8-1+deb8u4.

For the unstable distribution (sid), this problem has been fixed in
version 2:4.2.7.1-1.

We recommend that you upgrade your rails packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
—–BEGIN PGP SIGNATURE—–
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=akwG
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2016-08-0154-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost programskog paketa eog

Otkrivena je ranjivost čitanja podataka izvan granica dodijeljenje memorije u programskom paketu eog prilikom obrade posebno oblikovane SVG datoteke s...

Close