Lucene search

K
debianDebianDEBIAN:DLA-3095-1:555CC
HistorySep 03, 2022 - 8:51 p.m.

[SECURITY] [DLA 3095-1] ruby-rack security update

2022-09-0320:51:48
lists.debian.org
15

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.4%


Debian LTS Advisory DLA-3095-1 [email protected]
https://www.debian.org/lts/security/ Utkarsh Gupta
September 04, 2022 https://wiki.debian.org/LTS


Package : ruby-rack
Version : 2.0.6-3+deb10u1
CVE ID : CVE-2022-30122 CVE-2022-30123

Two vulnerabilities were discovered in ruby-rack, a popular Ruby
webserver:

CVE-2022-30122:

Prevent a Denial of Service (DoS) vulnerability in the HTTP
multipart parsing.

CVE-2022-30123:

Prevent a potential shell escape sequence injection
vulnerability that could be triggered through the logging system.

For Debian 10 buster, these problems have been fixed in version
2.0.6-3+deb10u1.

We recommend that you upgrade your ruby-rack packages.

For the detailed security status of ruby-rack please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ruby-rack

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

OSVersionArchitecturePackageVersionFilename
Debian11allruby-rack< 2.1.4-3+deb11u1ruby-rack_2.1.4-3+deb11u1_all.deb
Debian10allruby-rack< 2.0.6-3+deb10u1ruby-rack_2.0.6-3+deb10u1_all.deb

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.003 Low

EPSS

Percentile

69.4%