Login
Newsletter
Werbung

Sicherheit: Cross-Site Scripting in rubygem-rack-ssl
Aktuelle Meldungen Distributionen
Name: Cross-Site Scripting in rubygem-rack-ssl
ID: FEDORA-2014-4118
Distribution: Fedora
Plattformen: Fedora 20
Datum: Do, 3. April 2014, 11:52
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2538
Applikationen: rubygem-rack-ssl

Originalnachricht

Name        : rubygem-rack-ssl
Product : Fedora 20
Version : 1.3.2
Release : 9.fc20
URL : https://github.com/josh/rack-ssl
Summary : Force SSL/TLS in your app
Description :
Rack middleware to force SSL/TLS.

-------------------------------------------------------------------------------
-
Update Information:

Handle bad URIs gracefully (CVE-2014-2538).
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Mar 20 2014 Vít Ondruch <vondruch@redhat.com> - 1.3.2-9
- Handle bad URIs gracefully (CVE-2014-2538).
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1078612 - CVE-2014-2538 rubygem rack-ssl: URL error display XSS
https://bugzilla.redhat.com/show_bug.cgi?id=1078612
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update rubygem-rack-ssl' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung