Package: ruby-rack / 2.1.4-3+deb11u2
Metadata
Package | Version | Patches format |
---|---|---|
ruby-rack | 2.1.4-3+deb11u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
skip random failure.patch | (download) |
test/spec_builder.rb |
1 1 + 0 - 0 ! |
skip random failure. |
0002 Make tests pass on hosts that have no ipv4 connectiv.patch | (download) |
test/spec_server.rb |
8 4 + 4 - 0 ! |
make tests pass on hosts that have no ipv4 connectivity This is a backport of the patch sent upstream. |
CVE 2022 30122.patch | (download) |
lib/rack/multipart.rb |
3 1 + 2 - 0 ! |
[patch 1/3] restrict broken mime parsing This commit restricts broken mime parsing to deal with a ReDOS vulnerability. [CVE-2022-30122] |
CVE 2022 30123.patch | (download) |
lib/rack/common_logger.rb |
3 3 + 0 - 0 ! |
[patch 2/3] escape untrusted text when logging This fixes a shell escape issue [CVE-2022-30123] |
CVE 2022 44570.patch | (download) |
lib/rack/utils.rb |
11 6 + 5 - 0 ! |
[patch] fix redos in rack::utils.get_byte_ranges This commit fixes a ReDoS problem in `get_byte_ranges`. Thanks @ooooooo_q for the patch! [CVE-2022-44570] |
CVE 2022 44571.patch | (download) |
lib/rack/multipart.rb |
2 1 + 1 - 0 ! |
[patch] fix redos vulnerability in multipart parser This commit fixes a ReDoS vulnerability when parsing the Content-Disposition field in multipart attachments Thanks to @ooooooo_q for the patch! [CVE-2022-44571] |
CVE 2022 44572.patch | (download) |
lib/rack/multipart.rb |
2 1 + 1 - 0 ! |
[patch] forbid control characters in attributes This commit restricts the characters accepted in ATTRIBUTE_CHAR, forbidding control characters and fixing a ReDOS vulnerability. This also now should fully follow the RFCs. RFC 2231, Section 7 specifies: attribute-char := <any (US-ASCII) CHAR except SPACE, CTLs, "*", "'", "%", or tspecials> RFC 2045, Appendix A specifies: tspecials := "(" / ")" / "<" / ">" / "@" / "," / ";" / ":" / "\" / <"> "/" / "[" / "]" / "?" / "=" RFC 822, Section 3.3 specifies: CTL = <any ASCII control ; ( 0- 37, 0.- 31.) character and DEL> ; ( 177, 127.) SPACE = <ASCII SP, space> ; ( 40, 32.) [CVE-2022-44572] |
CVE 2023 27530.patch | (download) |
README.rdoc |
20 17 + 3 - 0 ! |
[patch] limit all multipart parts, not just files Previously we would limit the number of multipart parts which were files, but not other parts. In some cases this could cause parsing of maliciously crafted inputs to take longer than expected. [CVE-2023-27530] |
CVE 2023 27539.patch | (download) |
lib/rack/request.rb |
4 2 + 2 - 0 ! |
[patch] avoid redos problem Split headers on commas, then strip the strings in order to avoid ReDoS issues. [CVE-2023-27539] |
0001 Avoid 2nd degree polynomial regexp in MediaType.patch | (download) |
lib/rack/media_type.rb |
13 9 + 4 - 0 ! |
avoid 2nd degree polynomial regexp in mediatype |
0002 Return an empty array when ranges are too large.patch | (download) |
lib/rack/utils.rb |
3 3 + 0 - 0 ! |
return an empty array when ranges are too large If the sum of the requested ranges is larger than the file itself, return an empty array. In other words, refuse to respond with any bytes. [CVE-2024-26141] |
0003 Fixing ReDoS in header parsing.patch | (download) |
lib/rack/utils.rb |
4 2 + 2 - 0 ! |
fixing redos in header parsing Thanks svalkanov [CVE-2024-26146] |