From 555767568f00794f4bea8ebfb14a63df8aa1b7f2 Mon Sep 17 00:00:00 2001 From: f Date: Wed, 29 Jun 2022 18:21:05 -0300 Subject: [PATCH] puma Name: puma Version: 5.5.2 CVE: CVE-2022-23634 GHSA: GHSA-rmj8-8hhh-gv5h Criticality: High URL: https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h Title: Information Exposure with Puma when used with Rails Solution: upgrade to ~> 4.3.11, >= 5.6.2 Name: puma Version: 5.5.2 CVE: CVE-2022-24790 GHSA: GHSA-h99w-9q5r-gjq9 Criticality: Unknown URL: https://github.com/puma/puma/security/advisories/GHSA-h99w-9q5r-gjq9 Title: HTTP Request Smuggling in puma Solution: upgrade to ~> 4.3.12, >= 5.6.4 --- Gemfile.lock | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Gemfile.lock b/Gemfile.lock index 1e195609..6a62710a 100644 --- a/Gemfile.lock +++ b/Gemfile.lock @@ -401,7 +401,7 @@ GEM coderay (~> 1.1) method_source (~> 1.0) public_suffix (4.0.6) - puma (5.5.2-x86_64-linux-musl) + puma (5.6.4-x86_64-linux-musl) nio4r (~> 2.0) pundit (2.1.1) activesupport (>= 3.0.0)