Bug 1207599 (CVE-2022-44571) - VUL-0: CVE-2022-44571: rubygem-rack: denial of service in Content-Disposition parsing
Summary: VUL-0: CVE-2022-44571: rubygem-rack: denial of service in Content-Disposition...
Status: RESOLVED FIXED
Alias: CVE-2022-44571
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/355017/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-44571:5.9:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-01-26 16:44 UTC by Thomas Leroy
Modified: 2024-05-03 10:44 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Leroy 2023-01-26 16:44:33 UTC
rh#2164714

Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted.

Upstream fix:
https://github.com/rack/rack/commit/b79bb5ac6e7478aa02f624bd9ef00b25c2502af5

References:
https://bugzilla.redhat.com/show_bug.cgi?id=2164714
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-44571
Comment 1 Thomas Leroy 2023-01-26 16:45:35 UTC
Affected:
- SUSE:SLE-12:Update
- SUSE:SLE-15:Update
Comment 2 Petr Gajdos 2023-01-27 08:54:18 UTC
Will submit for 15,12/rubygem-rack.
Comment 3 Petr Gajdos 2023-01-27 09:09:16 UTC
Packages submitted.

I believe all fixed.
Comment 5 Swamp Workflow Management 2023-02-06 20:21:11 UTC
SUSE-SU-2023:0276-1: An update that fixes three vulnerabilities is now available.

Category: security (moderate)
Bug References: 1207596,1207597,1207599
CVE References: CVE-2022-44570,CVE-2022-44571,CVE-2022-44572
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    rubygem-rack-2.0.8-150000.3.12.1
SUSE Linux Enterprise High Availability 15-SP4 (src):    rubygem-rack-2.0.8-150000.3.12.1
SUSE Linux Enterprise High Availability 15-SP3 (src):    rubygem-rack-2.0.8-150000.3.12.1
SUSE Linux Enterprise High Availability 15-SP2 (src):    rubygem-rack-2.0.8-150000.3.12.1
SUSE Linux Enterprise High Availability 15-SP1 (src):    rubygem-rack-2.0.8-150000.3.12.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Maintenance Automation 2023-03-08 08:30:01 UTC
SUSE-SU-2023:0649-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1207597, 1207599
CVE References: CVE-2022-44570, CVE-2022-44571
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src): rubygem-rack-1.6.13-3.16.1
SUSE OpenStack Cloud Crowbar 9 (src): rubygem-rack-1.6.13-3.16.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Robert Frohl 2024-05-03 10:44:50 UTC
done, closing