USN-6837-2: Rack vulnerabilities
19 August 2024
Several security issues were fixed in Rack.
Releases
Packages
- ruby-rack - modular Ruby webserver interface
Details
It was discovered that Rack incorrectly parsed certain media types. A
remote attacker could possibly use this issue to cause Rack to consume
resources, leading to a denial of service. This issue only affected
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2024-25126)
It was discovered that Rack incorrectly handled certain Range headers. A
remote attacker could possibly use this issue to cause Rack to create
large responses, leading to a denial of service. (CVE-2024-26141)
It was discovered that Rack incorrectly handled certain crafted headers. A
remote attacker could possibly use this issue to cause Rack to consume
resources, leading to a denial of service. (CVE-2024-26146)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
ruby-rack
-
2.1.4-5ubuntu1+esm5
Available with Ubuntu Pro
Ubuntu 20.04
-
ruby-rack
-
2.0.7-2ubuntu0.1+esm5
Available with Ubuntu Pro
Ubuntu 18.04
-
ruby-rack
-
1.6.4-4ubuntu0.2+esm6
Available with Ubuntu Pro
Ubuntu 16.04
-
ruby-rack
-
1.6.4-3ubuntu0.2+esm6
Available with Ubuntu Pro
Ubuntu 14.04
-
ruby-rack
-
1.5.2-3+deb8u3ubuntu1~esm8
Available with Ubuntu Pro
After a standard system update you need to restart any applications using
Rack to make all the necessary changes.
References
Related notices
- USN-6837-1: ruby-rack
- USN-7036-1: ruby-rack
- USN-6689-1: ruby-rack