SB2025110402 - Debian update for ruby-rack
Published: November 4, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2025-61770)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in Rack::Multipart::Parser. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
2) Resource exhaustion (CVE-ID: CVE-2025-61771)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in Rack::Multipart::Parser when handling file parts. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
3) Resource exhaustion (CVE-ID: CVE-2025-61772)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in Rack::Multipart::Parser when handling multipart headers. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
4) Information disclosure (CVE-ID: CVE-2025-61780)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to improper handling of headers in "Rack::Sendfile". A remote attacker can bypass proxy-enforced restrictions and access internal endpoints.
5) Resource exhaustion (CVE-ID: CVE-2025-61919)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in "Rack::Request" form parsing. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.