MGASA-2025-0334

Source
https://advisories.mageia.org/MGASA-2025-0334.html
Import Source
https://advisories.mageia.org/MGASA-2025-0334.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0334
Related
Published
2025-12-29T20:41:12Z
Modified
2026-02-04T03:51:10.695690Z
Summary
Updated ruby-rack packages fix security vulnerabilities
Details

Unbounded-Parameter DoS in Rack::QueryParser. (CVE-2025-46727) ReDoS Vulnerability in Rack::Multipart handlemimehead. (CVE-2025-49007) Rack QueryParser has an unsafe default allowing params_limit bypass via semicolon-separated parameters. (CVE-2025-59830) Rack's unbounded multipart preamble buffering enables DoS (memory exhaustion). (CVE-2025-61770) Rack's multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion). (CVE-2025-61771) Rack's multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion). (CVE-2025-61772) Rack is vulnerable to a memory-exhaustion DoS through unbounded URL-encoded body parsing. (CVE-2025-61919) Rack has Possible Information Disclosure Vulnerability. (CVE-2025-61780)

References
Credits

Affected packages

Mageia:9 / ruby-rack

Package

Name
ruby-rack
Purl
pkg:rpm/mageia/ruby-rack?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.21-1.mga9

Ecosystem specific

{
    "section": "core"
}

Database specific

source
"https://advisories.mageia.org/MGASA-2025-0334.json"