摘要:
rubygem-rack security update
安全等级: High
公告ID: KylinSec-SA-2024-6685
发布日期: 2025年9月12日
关联CVE: CVE-2024-26141 CVE-2022-44572
Rack provides a minimal, modular, and adaptable interface for developing web applications in Ruby. By wrapping HTTP requests and responses in the simplest way possible, it unifies and distills the API for web servers, web frameworks, and software in between (the so-called middleware) into a single method call.
Security Fix(es):
A denial of service vulnerability in the multipart parsing component of Rack fixed in 2.0.9.2, 2.1.4.2, 2.2.4.1 and 3.0.0.1 could allow an attacker tocraft input that can cause RFC2183 multipart boundary parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.(CVE-2022-44572)
Rack is a modular Ruby web server interface. Carefully crafted Range headers can cause a server to respond with an unexpectedly large response. Responding with such large responses could lead to a denial of service issue. Vulnerable applications will use the `Rack::File` middleware or the `Rack::Utils.byte_ranges` methods (this includes Rails applications). The vulnerability is fixed in 3.0.9.1 and 2.2.8.1.(CVE-2024-26141)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-26141 | KY3.5.3 | rubygem-rack | Fixed |
CVE-2022-44572 | KY3.5.3 | rubygem-rack | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
rubygem-rack | noarch | 2.2.3.1-8.ky3_5 |
rubygem-rack-help | noarch | 2.2.3.1-8.ky3_5 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名