Debian: DSA-2783-1: librack-ruby security update

    Date 21 Oct 2013
    86
    Posted By LinuxSecurity Advisories
    Several vulnerabilities were discovered in Rack, a modular Ruby webserver interface. The Common Vulnerabilites and Exposures project identifies the following vulnerabilities:
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-2783-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                           Thijs Kinkhorst
    October 21, 2013                       https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : librack-ruby
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    CVE ID         : CVE-2011-5036 CVE-2013-0184 CVE-2013-0263
    Debian Bug     : 653963 698440 700226
    
    Several vulnerabilities were discovered in Rack, a modular Ruby
    webserver interface. The Common Vulnerabilites and Exposures project
    identifies the following vulnerabilities:
    
    CVE-2011-5036
    
        Rack computes hash values for form parameters without restricting
        the ability to trigger hash collisions predictably, which allows
        remote attackers to cause a denial of service (CPU consumption)
        by sending many crafted parameters. 
    
    CVE-2013-0184
    
        Vulnerability in Rack::Auth::AbstractRequest allows remote
        attackers to cause a denial of service via unknown vectors.
    
    CVE-2013-0263
    
        Rack::Session::Cookie allows remote attackers to guess the
        session cookie, gain privileges, and execute arbitrary code via a
        timing attack involving am HMAC comparison function that does not
        run in constant time. 
    
    For the oldstable distribution (squeeze), these problems have been fixed in
    version 1.1.0-4+squeeze1.
    
    The stable, testing and unstable distributions do not contain the
    librack-ruby package. They have already been addressed in version
    1.4.1-2.1 of the ruby-rack package.
    
    We recommend that you upgrade your librack-ruby packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Are you considering making the switch to Purism's new Librem 14 Linux laptop to improve your security and privacy online?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/31-are-you-considering-making-the-switch-to-purism-s-new-librem-14-linux-laptop-to-improve-your-security-and-privacy-online?task=poll.vote&format=json
    31
    radio
    [{"id":"109","title":"Yes - the hardware kill switches and default ad blocking\/tracking protection sold me on it.","votes":"2","type":"x","order":"1","pct":40,"resources":[]},{"id":"110","title":"Not sure yet - I need to do more research.","votes":"2","type":"x","order":"2","pct":40,"resources":[]},{"id":"111","title":"No - I'm satisfied with my current laptop and have no security\/privacy concerns.","votes":"1","type":"x","order":"3","pct":20,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.