drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Scripting in rubygem-actionview
Name: |
Cross-Site Scripting in rubygem-actionview |
|
ID: |
FEDORA-2016-0d9890f7b5 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 24 |
|
Datum: |
Fr, 26. August 2016, 12:51 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6316 |
|
Applikationen: |
rubygem-actionview |
|
Originalnachricht |
Name : rubygem-actionview Product : Fedora 24 Version : 4.2.5.2 Release : 3.fc24 URL : http://www.rubyonrails.org Summary : Rendering framework putting the V in MVC (part of Rails) Description : Simple, battle-tested conventions and helpers for building web pages.
------------------------------------------------------------------------------- - Update Information:
- Fix for CVE-2016-6316 (rhbz#1366480) ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1366480 - CVE-2016-6316 rubygem-actionview: cross-site scripting flaw in Action View [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1366480 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update rubygem-actionview' at the command line. For more information, refer to "Managing Software with yum", available at https://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://lists.fedoraproject.org/admin/lists/package-announce@lists.fedoraproject.org
|
|
|
|