First published: Tue Jan 15 2013(Updated: )
A flaw that was fixed in 1.4.4, 1.3.9, 1.2.7, and 1.1.5 was also announced [4] that creates a minor denial of service condition, this time in the Rack::Auth::AbstractRequest, where it symbolized arbitrary strings (apparently this has something to do with authentication, but there is no further information provided other than the fix [5] itself, which is noted as "a breaking API change"). [4] <a href="https://groups.google.com/forum/#!topic/rack-devel/ImYOqcGiksw/discussion">https://groups.google.com/forum/#!topic/rack-devel/ImYOqcGiksw/discussion</a> [5] <a href="https://github.com/rack/rack/commit/0c76175fcccad74ba2f991c487d3669c28a297c8">https://github.com/rack/rack/commit/0c76175fcccad74ba2f991c487d3669c28a297c8</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rack Project Rack | =1.1.0 | |
Rack Project Rack | =1.1.2 | |
Rack Project Rack | =1.1.3 | |
Rack Project Rack | =1.1.4 | |
Rack Project Rack | =1.2.0 | |
Rack Project Rack | =1.2.1 | |
Rack Project Rack | =1.2.2 | |
Rack Project Rack | =1.2.3 | |
Rack Project Rack | =1.2.4 | |
Rack Project Rack | =1.2.6 | |
Rack Project Rack | =1.3.0 | |
Rack Project Rack | =1.3.1 | |
Rack Project Rack | =1.3.2 | |
Rack Project Rack | =1.3.3 | |
Rack Project Rack | =1.3.4 | |
Rack Project Rack | =1.3.5 | |
Rack Project Rack | =1.3.6 | |
Rack Project Rack | =1.3.7 | |
Rack Project Rack | =1.3.8 | |
Rack Project Rack | =1.4.0 | |
Rack Project Rack | =1.4.1 | |
Rack Project Rack | =1.4.2 | |
Rack Project Rack | =1.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.