There is a possible Denial of Service vulnerability in the Mime type parser
Action Dispatch. This vulnerability has been assigned the CVE identifier
Versions Affected: >= 6.0.0
Not affected: < 6.0.0
Fixed Versions: 220.127.116.11, 18.104.22.168
There is a possible Denial of Service vulnerability in Action Dispatch.
Carefully crafted Accept headers can cause the mime type parser in Action
Dispatch to do catastrophic backtracking in the regular expression engine.
The fixed releases are available at the normal locations.
The following monkey patch placed in an initializer can be used to work
To aid users who aren't able to upgrade immediately we have provided
the two supported release series. They are in git-am format and consist of a
* 6-0-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch
for 6.0 series
* 6-1-Prevent-catastrophic-backtracking-during-mime-parsin.patch - Patch
for 6.1 series
Please note that only the 6.1.Z, 6.0.Z, and 5.2.Z series are supported at
present. Users of earlier unsupported releases are advised to upgrade as
as possible as we cannot guarantee the continued availability of security
fixes for unsupported releases.
Thanks to Security Curious <security-curious> for reporting this!
Created rubygem-rails tracking bugs for this issue:
Affects: fedora-all [bug 1961383]
Sat 6.8 and 6.9 tracker: https://bugzilla.redhat.com/show_bug.cgi?id=1961738
This issue has been addressed in the following products:
Red Hat Satellite 6.10 for RHEL 7
Via RHSA-2021:4702 https://access.redhat.com/errata/RHSA-2021:4702