Name | TEMP-0000000-23C1BD |
Description | Sidekiq::Web lacks CSRF protection |
Source | Automatically generated temporary name. Not for external reference. |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
ruby-sidekiq (PTS) | jessie | 3.2.6~dfsg-1 | vulnerable |
| stretch (security), stretch (lts), stretch | 4.2.3+dfsg-1+deb9u1 | fixed |
| buster (security), buster, buster (lts) | 5.2.3+dfsg-1+deb10u1 | fixed |
| bullseye | 6.0.4+dfsg-2 | fixed |
| bookworm | 6.4.1+dfsg-1 | fixed |
| sid, trixie | 7.3.2+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
ruby-sidekiq | source | (unstable) | 3.4.2~dfsg-3 | | | |
Notes
[jessie] - ruby-sidekiq <no-dsa> (Minor issue)
https://github.com/mperham/sidekiq/pull/2422
Fixed by https://github.com/mperham/sidekiq/commit/cf3c43b2410c4573e05ac119494e41115f4140ad
Fix released in sidekiq 3.4.2
Follow-up fix: https://github.com/mperham/sidekiq/commit/75a3524c919857aac16e0541b0cb107f48d00694
Follow-up commit not included in 3.4.2~dfsg-1
CVE Request: https://www.openwall.com/lists/oss-security/2015/08/01/2