Bug 1789100 (CVE-2019-16782)
Summary: | CVE-2019-16782 rubygem-rack: hijack sessions by using timing attacks targeting the session id | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | bbuckingham, bcourt, bkearney, bmidwood, btotty, dbecker, dmetzger, gblomqui, gmccullo, gp, gtanzill, hhorak, hhudgeon, hvyas, jaruga, jfrey, jhardy, jjoyce, jorton, jschluet, kbasil, kdixon, lavenel, lhh, lpeer, lzap, mburns, mmccune, mo, obarenbo, puebele, rchan, rhos-maint, rjerrido, roliveri, ruby-maint, ruby-packagers-sig, sclewis, simaishi, sisharma, slinaber, smallamp, sokeeffe, steve.traylen, strzibny, vbellur, vondruch, ytale |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Rack 1.6.12, Rack 2.0.8 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in rubygem-rack in versions prior to 1.6.12 and 2.0.8. An information leak may allow an attacker to find and hijack sessions using timing attacks targeting the session ID. The highest threat from the vulnerability is to data confidentiality.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-06-10 17:20:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1789101, 1789102, 1789103, 1790305, 1790340, 1790341, 1790342, 1790343, 1790344, 1790345, 1790346, 1790347, 1790348, 1793968, 1797947, 1797948, 1797949, 1797950, 1797951, 1797952, 1797953, 1797954, 1797955, 1804332, 1825820, 1825821 | ||
Bug Blocks: | 1789104 |
Description
Guilherme de Almeida Suckevicz
2020-01-08 18:14:53 UTC
Created rubygem-rack tracking bugs for this issue: Affects: epel-6 [bug 1789102] Affects: epel-7 [bug 1789103] Affects: fedora-all [bug 1789101] Mitigation: There is no mitigation for this issue, the flaw can only be resolved by applying updates. External References: https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3 This issue has been addressed in the following products: CloudForms Management Engine 5.11 Via RHSA-2020:2480 https://access.redhat.com/errata/RHSA-2020:2480 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-16782 Statement: Because Red Hat OpenStack Platform 13.0 Operational Tools packaged the flawed code, but does not use its functionality, its Impact has been reduced to 'Low'. |