Debian alert DLA-3095-1 (ruby-rack)
| From: | Utkarsh Gupta <guptautkarsh2102@gmail.com> | |
| To: | debian-lts-announce@lists.debian.org | |
| Subject: | [SECURITY] [DLA 3095-1] ruby-rack security update | |
| Date: | Sun, 04 Sep 2022 02:21:48 +0530 | |
| Message-ID: | <CAPP0f96C9nBq_CgUrfnpgpnZTDBxTRmwZUaRc+UVhY28gH-Hhg@mail.gmail.com> |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ----------------------------------------------------------------------- Debian LTS Advisory DLA-3095-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Utkarsh Gupta September 04, 2022 https://wiki.debian.org/LTS - ----------------------------------------------------------------------- Package : ruby-rack Version : 2.0.6-3+deb10u1 CVE ID : CVE-2022-30122 CVE-2022-30123 Two vulnerabilities were discovered in `ruby-rack`, a popular Ruby webserver: CVE-2022-30122: Prevent a Denial of Service (DoS) vulnerability in the HTTP multipart parsing. CVE-2022-30123: Prevent a potential shell escape sequence injection vulnerability that could be triggered through the logging system. For Debian 10 buster, these problems have been fixed in version 2.0.6-3+deb10u1. We recommend that you upgrade your ruby-rack packages. For the detailed security status of ruby-rack please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-rack Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbJ0QSEqa5Mw4X3xxgj6WdgbDS5YFAmMTvicACgkQgj6WdgbD S5agFRAAzYQxNDBX+Sb6vqEdcg/fu4AGr2aXQBByCGWBTEUyYkyETHtKa3NnLyXb /IZZ3WllQxLmuiVrsbhZsASZOD/BN3IyhIh1L+72axuu16ki148z5DuZpOlvI4yg 5NCXF+SbzYb6/dZDXN6CYGBhbTU8MW25m9Uv7dWfKki7k0H0vUBJdSUzOV2GK1Fn sNGZNmHK2nzaBUGDQZtmemHwFef3tYPw+yb6BxYgBbrgQJmN7nhLSlxbM37teOQk rCNess1Fzcx4dP64AvN9oN3aiuXV/+u1QFrOssKowX68yG/a6xPfKQ9goDhL8PnS Gq/ienBpVYv3R4ceqT6B17NJsZDzuxK46sxjKB2Jp8j7yo3x1+kCOvKhc+gnJq04 39IOuoS/RwBYfXfAGinNX3lrVucHvUVNqqWACVDmAhbOwWlHnh19kQpkfhwo++C7 kXExa1MuLqwBfoJ9MRMhZLkOe9zHhu3bM03qNZ9rajRXz1n3Vpd7pkY8xL1+QI5G j6UMUu+JCmrAZjUzcB0Tq46EEwenf0qTCpZ8YyY7sSysZyAIwRVzh/WON8JCVCKN 5PtySfsQgxGxLFgOJBQ7YmJYqnzINKp5YCZ0aj1LLUpcVWlnS1e+9sA3zGK4i0yv tCPgB46zvDUegkTRfYNrJhx1THYiyYCfUoQR+dG6xXx1QvPMPCQ= =eeZ/ -----END PGP SIGNATURE-----
