[ubuntu/jammy-security] ruby-rack 2.1.4-5ubuntu1.2 (Accepted)
Shishir Subedi
shishirsub10 at gmail.com
Thu Jan 15 00:44:27 UTC 2026
ruby-rack (2.1.4-5ubuntu1.2) jammy-security; urgency=medium
* SECURITY UPDATE: Denial of service through large query parameters.
- debian/patches/CVE-2025-46727.patch: Add query parameter limit and
bytesize limit and corresponding checks in ./lib/rack/query_parser.rb.
- CVE-2025-46727
* SECURITY UPDATE: Limited Denial of service
- debian/patches/CVE-2025-59830.patch: Fix unbounded parameter parsing
in `Rack::QueryParser` by counting both possible parameter separators
(& and ;)
- CVE-2025-59830
* SECURITY UPDATE: Denial of service
- d/p/CVE-2025-61770-and-CVE-2025-61772.patch: Enforce a size limit for
the preamble and multipart mime part header
- d/p/CVE-2025-61771.patch: Limit amount of retained data when parsing
multipart requests
- CVE-2025-61770
- CVE-2025-61772
- CVE-2025-61771
* SECURITY UPDATE: Information discloure using proxy bypass
- debian/patches/CVE-2025-61780.patch: Fix handling of proxy headers
(`HTTP_X_SENDFILE_TYPE` and `HTTP_X_ACCEL_MAPPING`) in Rack::Sendfile
- CVE-2025-61780
* SECURITY UPDATE: Denial of service through memory exhaustion
- debian/patches/CVE-2025-61919.patch: Enforce form parameter limit
using `query_parser.bytesize_limit` preventing unbounded read of
`application/x-www-form-urlencoded` bodies
- CVE-2025-61919
Date: 2026-01-14 04:06:12.301240+00:00
Changed-By: Shishir Subedi <shishirsub10 at gmail.com>
https://launchpad.net/ubuntu/+source/ruby-rack/2.1.4-5ubuntu1.2
-------------- next part --------------
Sorry, changesfile not available.
More information about the jammy-changes
mailing list