Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in rubygem-rack
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in rubygem-rack
ID: SUSE-SU-2023:0649-1
Distribution: SUSE
Plattformen: SUSE OpenStack Cloud Crowbar 8, SUSE OpenStack Cloud Crowbar 9, SUSE Linux Enterprise Server 12 SP4, SUSE Linux Enterprise High Performance Computing 12 SP3, SUSE Linux Enterprise Server 12 SP3
Datum: Mi, 8. März 2023, 22:59
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44571
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44570
Applikationen: Ruby Rack

Originalnachricht

--===============4516711663755228321==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for rubygem-rack

Announcement ID: SUSE-SU-2023:0649-1
Rating: moderate
References:

* #1207597
* #1207599


Cross-References:

* CVE-2022-44570
* CVE-2022-44571


CVSS scores:

* CVE-2022-44570 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-44570 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-44571 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-44571 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* SUSE Linux Enterprise High Performance Computing 12 SP3
* SUSE Linux Enterprise Server 12 SP3
* SUSE Linux Enterprise Server 12 SP4
* SUSE OpenStack Cloud Crowbar 8
* SUSE OpenStack Cloud Crowbar 9



An update that solves two vulnerabilities can now be installed.

## Description:

This update for rubygem-rack fixes the following issues:

* CVE-2022-44570: Fixed a potential denial of service when parsing a RFC2183
multipart boundary (bsc#1207597).
* CVE-2022-44571: Fixed a potential denial of service when parsing a Range
header (bsc#1207599).

## Patch Instructions:

To install this SUSE Moderate update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE OpenStack Cloud Crowbar 8
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2023-649=1

* SUSE OpenStack Cloud Crowbar 9
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2023-649=1

## Package List:

* SUSE OpenStack Cloud Crowbar 8 (x86_64)
* ruby2.1-rubygem-rack-1.6.13-3.16.1
* SUSE OpenStack Cloud Crowbar 9 (x86_64)
* ruby2.1-rubygem-rack-1.6.13-3.16.1

## References:

* https://www.suse.com/security/cve/CVE-2022-44570.html
* https://www.suse.com/security/cve/CVE-2022-44571.html
* https://bugzilla.suse.com/show_bug.cgi?id=1207597
* https://bugzilla.suse.com/show_bug.cgi?id=1207599


--===============4516711663755228321==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit





<div class="container">
<h1>Security update for rubygem-rack</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2023:0649-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>moderate</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207597">#1207597</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207599">#1207599</a>
</li>

</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-44570.html">CVE-2022-44570</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-44571.html">CVE-2022-44571</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-44570</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-44570</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-44571</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-44571</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 12 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 12 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 12 SP4</li>

<li class="list-group-item">SUSE
OpenStack Cloud Crowbar 8</li>

<li class="list-group-item">SUSE
OpenStack Cloud Crowbar 9</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves two vulnerabilities can now be
installed.</p>

<h2>Description:</h2>
<p>This update for rubygem-rack fixes the following issues:</p>
<ul>
<li>CVE-2022-44570: Fixed a potential denial of service when parsing a
RFC2183 multipart boundary (bsc#1207597).</li>
<li>CVE-2022-44571: Fixed a potential denial of service when parsing a
Range header (bsc#1207599).</li>
</ul>



<h2>Patch Instructions:</h2>
<p>
To install this SUSE Moderate update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE OpenStack Cloud Crowbar 8


<br/>
<code>zypper in -t patch
SUSE-OpenStack-Cloud-Crowbar-8-2023-649=1</code>



</li>

<li class="list-group-item">
SUSE OpenStack Cloud Crowbar 9


<br/>
<code>zypper in -t patch
SUSE-OpenStack-Cloud-Crowbar-9-2023-649=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE OpenStack Cloud Crowbar 8 (x86_64)
<ul>


<li>ruby2.1-rubygem-rack-1.6.13-3.16.1</li>

</ul>
</li>



<li>
SUSE OpenStack Cloud Crowbar 9 (x86_64)
<ul>


<li>ruby2.1-rubygem-rack-1.6.13-3.16.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2022-44570.html">https://www.suse.com/security/cve/CVE-2022-44570.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-44571.html">https://www.suse.com/security/cve/CVE-2022-44571.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207597">https://bugzilla.suse.com/show_bug.cgi?id=1207597</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207599">https://bugzilla.suse.com/show_bug.cgi?id=1207599</a>
</li>


</ul>

</div>

--===============4516711663755228321==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung