The Windows Subsystem for Linux in the Microsoft Store is now generally available on Windows 10 and 11

Today the Windows Subsystem for Linux (WSL) in the Microsoft Store is dropping its “Preview” label and becomes generally available with our latest release! We are also making the Store version of WSL the default for new users who run wsl –install and easily upgradeable by running wsl –update for existing users. Using the Store version of WSL allows you to get updates to WSL much faster compared to when it was a Windows component. In response to the WSL community’s requests, WSL in the Store will now also be available on Windows 10 in addition to Windows 11. So, Windows 10 users will also be able to enjoy all of the latest features for WSL including systemd and Linux GUI app support! I obviously have no hard data on this, but I feel like WSL is actually quite popular among developers, as it gives Windows users easy access to a very popular tool chain and development platform. I don’t know just how transferable knowledge and experience gained through WSL is to “real” Linux, but it seems close enough.

Mehfil-e-Sama – Qawwali – 21st November 2022 – ARY Qtv

Mehfil-e-Sama – Qawwali – ARY Qtv

Subscribe Here: https://bit.ly/3dh3Yj1

#MehfileNaatoManqabat #ARYQtv

Official Facebook: https://www.facebook.com/ARYQTV/
Official Website: https://aryqtv.tv/
Watch ARY Qtv Live: http://live.aryqtv.tv/
Programs Schedule: https://aryqtv.tv/schedule/
Islamic Information: https://bit.ly/2MfIF4P
Android App: https://bit.ly/33wgto4
Ios App: https: https://apple.co/2v3zoXW
To Watch More Click Here: http://aryqtv.tv

Tech/News/2022/47

Tech/News/2022/47
Other languages: Deutsch, English,Esperanto, Tiếng Việt, français, ikirundi, italiano, magyar, norsk bokmål, polski, suomi, svenska, čeština, русский, українська, עברית, العربية, বাংলা, ಕನ್ನಡ, ရခိုင်, 中文, 日本語,…

CVE-2021-33621: HTTP response splitting in CGI

We have released the cgi gem version 0.3.5, 0.2.2, and 0.1.0.2 that has a security fix for a HTTP response splitting vulnerability.
This vulnerability has been assigned the CVE identifier CVE-2021-33621.

Details

If an application that generates HTTP responses using the cgi gem with untrusted user input, an attacker can exploit it to inject a malicious HTTP response header and/or body.

Also, the contents for a CGI::Cookie object were not checked properly. If an application creates a CGI::Cookie object based on user input, an attacker may exploit it to inject invalid attributes in Set-Cookie header. We think such applications are unlikely, but we have included a change to check arguments for CGI::Cookie#initialize preventatively.

Please update the cgi gem to version 0.3.5, 0.2.2, and 0.1.0.2, or later. You can use gem update cgi to update it.
If you are using bundler, please add gem "cgi", ">= 0.3.5" to your Gemfile.

Affected versions

  • cgi gem 0.3.3 or before
  • cgi gem 0.2.1 or before
  • cgi gem 0.1.1 or 0.1.0.1 or 0.1.0

Credits

Thanks to Hiroshi Tokumaru for discovering this issue.

History

  • Originally published at 2022-11-22 02:00:00 (UTC)

Posted by mame on 22 Nov 2022