Name | CVE-2021-22902 |
Description | The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 988214 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
rails (PTS) | bullseye (security), bullseye | 2:6.0.3.7+dfsg-2+deb11u2 | fixed |
| bookworm | 2:6.1.7.3+dfsg-2~deb12u1 | fixed |
| sid, trixie | 2:6.1.7.3+dfsg-4 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
rails | source | stretch | (not affected) | | | |
rails | source | buster | (not affected) | | | |
rails | source | (unstable) | 2:6.0.3.7+dfsg-1 | | | 988214 |
Notes
[buster] - rails <not-affected> (Vulnerable code introduced later)
[stretch] - rails <not-affected> (Vulnerable code introduced later)
Fixed by: https://github.com/rails/rails/commit/b61b94181b2a0cecab49d90d8f259bc8e39b662a (main)
Fixed by: https://github.com/rails/rails/commit/446afbd15360a347c923ca775b21a286dcb5297a (v6.0.3.7)