Exploit/Advisories no image

Published on March 13th, 2023 📆 | 2956 Views ⚑

0

Debian Security Advisory 5372-1 – Torchsec


iSpeech

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5372-1 security@debian.org
https://www.debian.org/security/ Aron Xu
March 13, 2023 https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package : rails
CVE ID : CVE-2021-22942 CVE-2021-44528 CVE-2022-21831 CVE-2022-22577
CVE-2022-23633 CVE-2022-27777 CVE-2023-22792 CVE-2023-22794
CVE-2023-22795 CVE-2023-22796
Debian Bug : 992586 1001817 1011940 1011941 1005389 1016982 1030050

Multiple vunerabilities were discovered in rails, the Ruby based server-side
MVC web application framework, which could result in XSS, data disclosure
and open redirect.

For the stable distribution (bullseye), these problems have been fixed in
version 2:6.0.3.7+dfsg-2+deb11u1.

We recommend that you upgrade your rails packages.





For the detailed security status of rails please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/rails

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEhhz+aYQl/Bp4OTA7O1LKKgqv2VQFAmQOknYACgkQO1LKKgqv
2VSlyQf/X1+iNclWDo1qfYJFkoQeVDnEbLRohaYp/Jqu/CssQRDs5h09VcKEnWfg
uvMdgDXeVJu4gEIwnfUfgK4QnT1XwWlAJxH9YHEpYjBuzKJ6W0CJVFrmYCe2lKdq
3SfuZc7PK2MigtvACCpJevj1mRfRQjwfPYfduV8wNid+U+AOmeTF8yrcrJ4W092Q
mfk8RKtN3xWIFjJfOM/b8EPWEWYm1ozVl8+FwTc8d1+1nV6fXcoTZ0bICuII21VB
grfFqI79F6HNpIrsq3asC0QGE2uYcipTe5BhApQI7yQB6bOQ2AQ/CUj0rR1cGz3S
wmOoy4xm/vyD3O4oPqOCfSh+FuDm7Q==zqIV
-----END PGP SIGNATURE-----

Source link

Tagged with:



Comments are closed.