- ------------------------------------------------------------------------- Debian Security Advisory DSA-3322-1 This email address is being protected from spambots. You need JavaScript enabled to view it. https://www.debian.org/security/ Salvatore Bonaccorso July 31, 2015 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : ruby-rack CVE ID : CVE-2015-3225 Debian Bug : 789311 Tomek Rabczak from the NCC Group discovered a flaw in the normalize_params() method in Rack, a modular Ruby webserver interface. A remote attacker can use this flaw via specially crafted requests to cause a `SystemStackError` and potentially cause a denial of service condition for the service. For the oldstable distribution (wheezy), this problem has been fixed in version 1.4.1-2.1+deb7u1. For the stable distribution (jessie), this problem has been fixed in version 1.5.2-3+deb8u1. For the unstable distribution (sid), this problem has been fixed in version 1.5.2-4. We recommend that you upgrade your ruby-rack packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
Debian: DSA-3322-1: ruby-rack security update
Tomek Rabczak from the NCC Group discovered a flaw in the normalize_params() method in Rack, a modular Ruby webserver interface. A remote attacker can use this flaw via specially crafted requests to cause a `SystemStackError` and potentially cause a denial of service
You are not authorised to post comments.