Package "ruby-rack"
| Name: |
ruby-rack
|
Description: |
modular Ruby webserver interface
|
| Latest version: |
2.2.7-1ubuntu0.6 |
| Release: |
noble (24.04) |
| Level: |
security |
| Repository: |
main |
| Homepage: |
https://rack.github.io/ |
Links
Download "ruby-rack"
Other versions of "ruby-rack" in Noble
Changelog
|
ruby-rack (2.2.7-1ubuntu0.6) noble-security; urgency=medium
* SECURITY UPDATE: Directory Traversal Attack
- debian/patches/CVE-2026-22860.patch: Prevent directory traversal
via root prefix bypass
- CVE-2026-22860
* SECURITY UPDATE: XSS Injection
- debian/patches/CVE-2026-25500.patch: Stop XSS injection via malicious
filename in `Rack::Directory`
- CVE-2026-25500
-- Bruce Cable <email address hidden> Mon, 23 Feb 2026 10:20:36 +1100
|
| Source diff to previous version |
| CVE-2026-22860 |
Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a string prefix match o |
| CVE-2026-25500 |
Rack is a modular Ruby web server interface. Prior to versions 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory` generates an HTML directory index where e |
|
|
ruby-rack (2.2.7-1ubuntu0.5) noble-security; urgency=medium
* SECURITY UPDATE: Denial of service
- d/p/CVE-2025-61770-and-CVE-2025-61772.patch: Enforce a size limit for
the preamble and multipart mime part header
- d/p/CVE-2025-61771.patch: Limit amount of retained data when parsing
multipart requests
- CVE-2025-61770
- CVE-2025-61772
- CVE-2025-61771
* SECURITY UPDATE: Information discloure using proxy bypass
- debian/patches/CVE-2025-61780.patch: Fix handling of proxy headers
(`HTTP_X_SENDFILE_TYPE` and `HTTP_X_ACCEL_MAPPING`) in Rack::Sendfile
- CVE-2025-61780
* SECURITY UPDATE: Denial of service through memory exhaustion
- debian/patches/CVE-2025-61919.patch: Enforce form parameter limit
using `query_parser.bytesize_limit` preventing unbounded read of
`application/x-www-form-urlencoded` bodies
- CVE-2025-61919
-- Shishir Subedi <email address hidden> Mon, 01 Dec 2025 13:38:28 +0545
|
| Source diff to previous version |
| CVE-2025-61770 |
Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` buffers the entire multipart p |
| CVE-2025-61772 |
Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, `Rack::Multipart::Parser` can accumulate unbounded data |
| CVE-2025-61771 |
Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, ``Rack::Multipart::Parser` stores non-file form fields ( |
| CVE-2025-61780 |
Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, a possible information disclosure vulnerability existed in |
| CVE-2025-61919 |
Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, `Rack::Request#POST` reads the entire request body into mem |
|
|
ruby-rack (2.2.7-1ubuntu0.4) noble-security; urgency=medium
* SECURITY UPDATE: params_limit bypass using semicolon
- debian/patches/CVE-2025-59830.patch: also count semicolons in
lib/rack/query_parser.rb, test/spec_query_parser.rb.
- CVE-2025-59830
-- Marc Deslauriers <email address hidden> Fri, 26 Sep 2025 12:41:09 -0400
|
| Source diff to previous version |
| CVE-2025-59830 |
Rack is a modular Ruby web server interface. Prior to version 2.2.18, Rack::QueryParser enforces its params_limit only for parameters separated by &, |
|
|
ruby-rack (2.2.7-1ubuntu0.3) noble-security; urgency=medium
* SECURITY UPDATE: Race condition with authentication sessions.
- debian/patches/CVE-2025-32441.patch: Add get_session_with_fallback()
check and pool.store in ./lib/rack/session/pool.rb.
- CVE-2025-32441
* SECURITY UPDATE: Denial of service through large query parameters.
- debian/patches/CVE-2025-46727.patch: Add query parameter limit and
bytesize limit and corresponding checks in ./lib/rack/query_parser.rb.
- CVE-2025-46727
-- Hlib Korzhynskyy <email address hidden> Thu, 08 May 2025 15:58:56 -0230
|
| Source diff to previous version |
| CVE-2025-32441 |
Rack is a modular Ruby web server interface. Prior to version 2.2.14, when using the `Rack::Session::Pool` middleware, simultaneous rack requests can |
| CVE-2025-46727 |
Rack is a modular Ruby web server interface. Prior to versions 2.2.14, 3.0.16, and 3.1.14, `Rack::QueryParser` parses query strings and `application/ |
|
|
ruby-rack (2.2.7-1ubuntu0.2) noble-security; urgency=medium
* SECURITY UPDATE: injection vulnerabilities
- debian/patches/CVE-2025-25184.patch: Escape non-printable
characters when logging.
- debian/patches/CVE-2025-27111.patch: Use `#inspect` to prevent log
injection.
- CVE-2025-25184
- CVE-2025-27111
* SECURITY UPDATE: path traversal vulnerability
- debian/patches/CVE-2025-27610.patch: Use a fully resolved file
path when confirming if a file can be served by `Rack::Static`.
- CVE-2025-27610
-- Shishir Subedi <email address hidden> Fri, 14 Mar 2025 11:30:30 +0545
|
| CVE-2025-25184 |
Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.11, 3.0.12, and 3.1.10, Rack::CommonLogger can be exploited |
| CVE-2025-27111 |
Rack is a modular Ruby web server interface. The Rack::Sendfile middleware logs unsanitised header values from the X-Sendfile-Type header. An attacke |
| CVE-2025-27610 |
Rack provides an interface for developing web applications in Ruby. Prior to versions 2.2.13, 3.0.14, and 3.1.12, `Rack::Static` can serve files unde |
|
About
-
Send Feedback to @ubuntu_updates