From fc9f427c4f7a7671983fbf39b99f111da126b860 Mon Sep 17 00:00:00 2001 From: Luke Pearce Date: Tue, 7 Jun 2022 18:17:54 +0100 Subject: [PATCH] Security: Upgrade rack to 2.2.3.1 CVE: CVE-2022-30122 GHSA: GHSA-hxqx-xwvh-44m2 URL: https://groups.google.com/g/ruby-security-ann/c/L2Axto442qk Title: Denial of Service Vulnerability in Rack Multipart Parsing CVE: CVE-2022-30123 GHSA: GHSA-wq4h-7r42-5hrr URL: https://groups.google.com/g/ruby-security-ann/c/LWB10kWzag8 Title: Possible shell escape sequence injection vulnerability in Rack --- Gemfile.lock | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Gemfile.lock b/Gemfile.lock index eb1825c..a9f56d5 100644 --- a/Gemfile.lock +++ b/Gemfile.lock @@ -242,7 +242,7 @@ GEM pundit_helpers (1.0.0) pundit (~> 0.2, >= 0.2.2) racc (1.6.0) - rack (2.2.3) + rack (2.2.3.1) rack-cors (1.1.1) rack (>= 2.0.0) rack-test (1.1.0)