Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2019-16782

Published: 18 December 2019

There's a possible information leak / session hijack vulnerability in Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12 and 2.0.8. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.

Priority

Medium

Cvss 3 Severity Score

5.9

Score breakdown

Status

Package Release Status
ruby-rack
Launchpad, Ubuntu, Debian
bionic
Released (1.6.4-4ubuntu0.2+esm1)
Available with Ubuntu Pro
disco Ignored
(end of life)
eoan Ignored
(end of life)
focal
Released (2.0.7-2ubuntu0.1+esm1)
Available with Ubuntu Pro
groovy Not vulnerable
(2.1.1-4)
hirsute Not vulnerable
(2.1.1-4)
impish Not vulnerable
(2.1.1-4)
jammy Not vulnerable
(2.1.1-4)
kinetic Not vulnerable
(2.1.1-4)
lunar Not vulnerable
(2.1.1-4)
mantic Not vulnerable
(2.1.1-4)
trusty
Released (1.5.2-3+deb8u3ubuntu1~esm3)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream
Released (1.6.12, 2.0.8)
xenial
Released (1.6.4-3ubuntu0.2+esm1)
Available with Ubuntu Pro
Patches:
upstream: https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38

Severity score breakdown

Parameter Value
Base score 5.9
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N