Source: ruby-rack
Version: 3.1.12-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for ruby-rack.

CVE-2025-49007[0]:
| Rack is a modular Ruby web server interface. Starting in version
| 3.1.0 and prior to version 3.1.16, there is a denial of service
| vulnerability in the Content-Disposition parsing component of Rack.
| This is very similar to the previous security issue CVE-2022-44571.
| Carefully crafted input can cause Content-Disposition header parsing
| in Rack to take an unexpected amount of time, possibly resulting in
| a denial of service attack vector. This header is used typically
| used in multipart parsing. Any applications that parse multipart
| posts using Rack (virtually all Rails applications) are impacted.
| Version 3.1.16 contains a patch for the vulnerability.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-49007
    https://www.cve.org/CVERecord?id=CVE-2025-49007
[1] https://github.com/rack/rack/security/advisories/GHSA-47m2-26rw-j2jw
[2] https://github.com/rack/rack/commit/aed514df37e33907df3c971ed3ca9a0a20ac2901

Regards,
Salvatore

Reply via email to