Login
Newsletter
Werbung

Sicherheit: Cross-Site Scripting in rubygem-actionview
Aktuelle Meldungen Distributionen
Name: Cross-Site Scripting in rubygem-actionview
ID: FEDORA-2016-ab8bf51cf3
Distribution: Fedora
Plattformen: Fedora 23
Datum: Fr, 26. August 2016, 15:02
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6316
Applikationen: rubygem-actionview

Originalnachricht

Name        : rubygem-actionview
Product : Fedora 23
Version : 4.2.3
Release : 6.fc23
URL : http://www.rubyonrails.org
Summary : Rendering framework putting the V in MVC (part of Rails)
Description :
Simple, battle-tested conventions and helpers for building web pages.

-------------------------------------------------------------------------------
-
Update Information:

- Fix for CVE-2016-6316 (rhbz#1366480)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1366480 - CVE-2016-6316 rubygem-actionview: cross-site scripting
flaw in Action View [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1366480
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update rubygem-actionview' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung