• 公告ID (KylinSec-SA-2024-6685)

摘要:

rubygem-rack security update

安全等级: High

公告ID: KylinSec-SA-2024-6685

发布日期: 2025年9月12日

关联CVE: CVE-2024-26141   CVE-2022-44572  

  • 详细介绍

1. 漏洞描述

   

Rack provides a minimal, modular, and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call.

Security Fix(es):

A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.(CVE-2022-44572)

Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.(CVE-2024-26141)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-26141 KY3.5.3 rubygem-rack Fixed
CVE-2022-44572 KY3.5.3 rubygem-rack Fixed

3. 影响组件

    rubygem-rack

4. 修复版本

   

KY3.5.3

软件名称 架构 版本号
rubygem-rack noarch 2.2.3.1-8.ky3_5
rubygem-rack-help noarch 2.2.3.1-8.ky3_5

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

KY3.5.3:

x86_64:

     rubygem-rack   

     rubygem-rack-help   

aarch64:

     rubygem-rack   

     rubygem-rack-help   

上一篇:KylinSec-SA-2024-6709 下一篇:KylinSec-SA-2024-6689