Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/ruby-rack@0?distro=trixie
purl pkg:deb/debian/ruby-rack@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-7wvj-9h3p-23am ReDoS Vulnerability in Rack::Multipart handle_mime_head ### Summary There is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This is very similar to the previous security issue CVE-2022-44571. ### Details Carefully crafted input can cause Content-Disposition header parsing in Rack to take an unexpected amount of time, possibly resulting in a denial of service attack vector. This header is used typically used in multipart parsing. Any applications that parse multipart posts using Rack (virtually all Rails applications) are impacted. ### Credits Thanks to [scyoon](https://hackerone.com/scyoon) for reporting this to the Rails security team CVE-2025-49007
GHSA-47m2-26rw-j2jw
VCID-stpq-7qys-t3cf Rack ReDoS Vulnerability in HTTP Accept Headers Parsing ### Summary A Regular Expression Denial of Service (ReDoS) vulnerability exists in the `Rack::Request::Helpers` module when parsing HTTP Accept headers. This vulnerability can be exploited by an attacker sending specially crafted `Accept-Encoding` or `Accept-Language` headers, causing the server to spend excessive time processing the request and leading to a Denial of Service (DoS). ### Details The fix for https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f was not applied to the main branch and thus while the issue was fixed for the Rack v3.0 release series, it was not fixed in the v3.1 release series until v3.1.5. CVE-2024-39316
GHSA-cj83-2ww7-mvq7
VCID-sw69-1r7d-kkht Uncontrolled Resource Consumption There is a possible DoS vulnerability in the multipart parser in Rack. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size. CVE-2018-16470
GHSA-hg78-4f6x-99wq

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T10:48:56.543854+00:00 Debian Importer Fixing VCID-sw69-1r7d-kkht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:30:36.323952+00:00 Debian Importer Fixing VCID-7wvj-9h3p-23am https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:46:00.772537+00:00 Debian Importer Fixing VCID-stpq-7qys-t3cf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-12T18:15:46.578184+00:00 Debian Importer Fixing VCID-7wvj-9h3p-23am https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-12T18:15:45.369378+00:00 Debian Importer Fixing VCID-sw69-1r7d-kkht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:53:21.284528+00:00 Debian Importer Fixing VCID-stpq-7qys-t3cf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:52:20.684322+00:00 Debian Importer Fixing VCID-7wvj-9h3p-23am https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:20.285210+00:00 Debian Importer Fixing VCID-stpq-7qys-t3cf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:19.374129+00:00 Debian Importer Fixing VCID-sw69-1r7d-kkht https://security-tracker.debian.org/tracker/data/json 38.1.0