[prev in list] [next in list] [prev in thread] [next in thread] 

List:       ubuntu-security-announce
Subject:    [USN-5896-1] Rack vulnerabilities
From:       Camila Camargo de Matos <camila.camargodematos () canonical ! com>
Date:       2023-02-27 19:01:53
Message-ID: a4df7bad-8f37-60be-e025-a7df24372d60 () canonical ! com
[Download RAW message or body]

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
[Attachment #2 (multipart/mixed)]

[Attachment #4 (text/plain)]

==========================================================================
Ubuntu Security Notice USN-5896-1
February 27, 2023

ruby-rack vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in Rack.

Software Description:
- ruby-rack: modular Ruby webserver interface

Details:

It was discovered that Rack was not properly parsing data when processing
multipart POST requests. If a user or automated system were tricked into
sending a specially crafted multipart POST request to an application using
Rack, a remote attacker could possibly use this issue to cause a denial of
service. (CVE-2022-30122)

It was discovered that Rack was not properly escaping untrusted data when
performing logging operations, which could cause shell escaped sequences
to be written to a terminal. If a user or automated system were tricked
into sending a specially crafted request to an application using Rack, a
remote attacker could possibly use this issue to execute arbitrary code in
the machine running the application. (CVE-2022-30123)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
   ruby-rack                       2.1.4-5ubuntu1+esm2

Ubuntu 20.04 LTS:
   ruby-rack                       2.0.7-2ubuntu0.1+esm2

Ubuntu 18.04 LTS:
   ruby-rack                       1.6.4-4ubuntu0.2+esm2

After a standard system update you need to restart any applications using
Rack to make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5896-1
   CVE-2022-30122, CVE-2022-30123

Package Information:


["OpenPGP_signature.asc" (application/pgp-signature)]
[Attachment #6 (unknown)]




[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic