USN-5910-1: Rack vulnerabilities
2 March 2023
Several security issues were fixed in Rack.
Releases
Packages
- ruby-rack - modular Ruby webserver interface
Details
It was discovered that Rack did not properly structure regular expressions
in some of its parsing components, which could result in uncontrolled
resource consumption if an application using Rack received specially
crafted input. A remote attacker could possibly use this issue to cause a
denial of service. (CVE-2022-44570, CVE-2022-44571)
It was discovered that Rack did not properly structure regular expressions
in its multipart parsing component, which could result in uncontrolled
resource consumption if an application using Rack to parse multipart posts
received specially crafted input. A remote attacker could possibly use
this issue to cause a denial of service. This issue was only fixed in
Ubuntu 20.04 ESM and Ubuntu 22.04 ESM. (CVE-2022-44572)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
ruby-rack
-
2.1.4-5ubuntu1+esm3
Available with Ubuntu Pro
Ubuntu 20.04
-
ruby-rack
-
2.0.7-2ubuntu0.1+esm3
Available with Ubuntu Pro
Ubuntu 18.04
-
ruby-rack
-
1.6.4-4ubuntu0.2+esm4
Available with Ubuntu Pro
Ubuntu 16.04
-
ruby-rack
-
1.6.4-3ubuntu0.2+esm4
Available with Ubuntu Pro
Ubuntu 14.04
-
ruby-rack
-
1.5.2-3+deb8u3ubuntu1~esm6
Available with Ubuntu Pro
After a standard system update you need to restart any applications using
Rack to make all the necessary changes.
References
Related notices
- USN-7036-1: ruby-rack