CVE-2023-27530
Publication date 10 March 2023
Last updated 26 September 2024
Ubuntu priority
Cvss 3 Severity Score
A DoS vulnerability exists in Rack <v3.0.4.2, <v2.2.6.3, <v2.1.4.3 and <v2.0.9.3 within in the Multipart MIME parsing code in which could allow an attacker to craft requests that can be abuse to cause multipart parsing to take longer than expected.
Status
Package | Ubuntu Release | Status |
---|---|---|
ruby-rack | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Fixed 2.1.4-5ubuntu1.1
|
|
20.04 LTS focal |
Fixed 2.0.7-2ubuntu0.1+esm4
|
|
18.04 LTS bionic | Ignored intrusive backport | |
16.04 LTS xenial | Ignored intrusive backport | |
14.04 LTS trusty | Ignored end of ESM support, was ignored [intrusive backport] |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
Patch details
Package | Patch details |
---|---|
ruby-rack |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6837-1
- Rack vulnerabilities
- 17 June 2024
- USN-6905-1
- Rack vulnerabilities
- 23 July 2024
- USN-7036-1
- Rack vulnerabilities
- 26 September 2024