LWN.net Logo

rubygem-rack: multiple vulnerabilities

Package(s):rubygem-rack CVE #(s):CVE-2012-6109 CVE-2013-0183 CVE-2013-0184
Created:January 28, 2013 Updated:March 15, 2013
Description: From the Red Hat bugzilla [1], [2], [3]:

[1] Upstream released Rack 1.4.2, 1.3.7, 1.2.6, and 1.1.4 to fix a denial of service condition when Rack parses content with a certain Content-Disposition header as noted in the original report. (CVE-2012-6109)

[2] Upstream released [1] Rack 1.4.3 and 1.3.8 to fix a denial of service condition due to a malicious client sending excessively long lines that trigger an out-of-memory error in Rack. (CVE-2013-0183)

[3] A flaw that was fixed in 1.4.4, 1.3.9, 1.2.7, and 1.1.5 was also announced that creates a minor denial of service condition, this time in the Rack::Auth::AbstractRequest, where it symbolized arbitrary strings (apparently this has something to do with authentication, but there is no further information provided other than the fix itself, which is noted as "a breaking API change"). (CVE-2013-0184)

Alerts:
Fedora FEDORA-2013-0837 2013-01-25
Fedora FEDORA-2013-0861 2013-01-25
Fedora FEDORA-2013-0896 2013-01-25
openSUSE openSUSE-SU-2013:0338-1 2013-02-25
openSUSE openSUSE-SU-2013:0462-1 2013-03-14
SUSE SUSE-SU-2013:0508-1 2013-03-20

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds