First published: Fri Feb 08 2013(Updated: )
James Tucker (raggi) reports: CVE: <a href="https://access.redhat.com/security/cve/CVE-2013-0263">CVE-2013-0263</a> Software: Rack (rack.github.com) Type of vulnerability: Timing attack, leading to potential RCE Vulnerable code: <a href="https://github.com/rack/rack/blob/master/lib/rack/session/cookie.rb#L149">https://github.com/rack/rack/blob/master/lib/rack/session/cookie.rb#L149</a> Patch: <a href="https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07">https://github.com/rack/rack/commit/0cd7e9aa397f8ebb3b8481d67dbac8b4863a7f07</a> <a href="https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11">https://github.com/rack/rack/commit/9a81b961457805f6d1a5c275d053068440421e11</a> Versions affected: All prior versions. Versions fixed: 1.1.6, 1.2.8, 1.3.10, 1.4.5, 1.5.2 Reporter: Ben Murphy Reference: <a href="http://seclists.org/oss-sec/2013/q1/271">http://seclists.org/oss-sec/2013/q1/271</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/candlepin | <0:0.7.24-1.el6_3 | 0:0.7.24-1.el6_3 |
redhat/katello | <0:1.2.1.1-1h.el6_4 | 0:1.2.1.1-1h.el6_4 |
redhat/katello-configure | <0:1.2.3.1-4h.el6_4 | 0:1.2.3.1-4h.el6_4 |
redhat/rubygem-actionpack | <1:3.0.10-12.el6cf | 1:3.0.10-12.el6cf |
redhat/rubygem-activemodel | <0:3.0.10-3.el6cf | 0:3.0.10-3.el6cf |
redhat/rubygem-json | <0:1.7.3-2.el6_3 | 0:1.7.3-2.el6_3 |
redhat/rubygem-nokogiri | <0:1.5.0-0.9.beta4.el6cf | 0:1.5.0-0.9.beta4.el6cf |
redhat/rubygem-rack | <1:1.3.0-4.el6cf | 1:1.3.0-4.el6cf |
redhat/rubygem-rdoc | <0:3.8-6.el6cf | 0:3.8-6.el6cf |
redhat/thumbslug | <0:0.0.28.1-1.el6_4 | 0:0.0.28.1-1.el6_4 |
redhat/jenkins | <0:1.502-1.el6 | 0:1.502-1.el6 |
redhat/openshift-origin-cartridge-jenkins | <1.4-0:1.0.3-1.el6 | 1.4-0:1.0.3-1.el6 |
redhat/ruby193-rubygem-rack | <1:1.4.1-4.el6 | 1:1.4.1-4.el6 |
redhat/rubygem-rack | <1:1.3.0-4.el6 | 1:1.3.0-4.el6 |
Rack Project Rack | =1.5.0 | |
Rack Project Rack | =1.5.1 | |
Rack Project Rack | =1.4.0 | |
Rack Project Rack | =1.4.1 | |
Rack Project Rack | =1.4.2 | |
Rack Project Rack | =1.4.3 | |
Rack Project Rack | =1.4.4 | |
Rack Project Rack | =1.3.0 | |
Rack Project Rack | =1.3.1 | |
Rack Project Rack | =1.3.2 | |
Rack Project Rack | =1.3.3 | |
Rack Project Rack | =1.3.4 | |
Rack Project Rack | =1.3.5 | |
Rack Project Rack | =1.3.6 | |
Rack Project Rack | =1.3.7 | |
Rack Project Rack | =1.3.8 | |
Rack Project Rack | =1.3.9 | |
Rack Project Rack | =1.2.0 | |
Rack Project Rack | =1.2.1 | |
Rack Project Rack | =1.2.2 | |
Rack Project Rack | =1.2.3 | |
Rack Project Rack | =1.2.4 | |
Rack Project Rack | =1.2.6 | |
Rack Project Rack | =1.2.7 | |
Rack Project Rack | =1.1.0 | |
Rack Project Rack | =1.1.4 | |
Rack Project Rack | =1.1.5 | |
Rack Project Rack | =1.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.