Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/ruby-rack@3.0.8-2?distro=trixie
purl pkg:deb/debian/ruby-rack@3.0.8-2?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-gdhf-e8q1-kbat Rack has an unsafe default in Rack::QueryParser allows params_limit bypass via semicolon-separated parameters `Rack::QueryParser` in version `< 2.2.18` enforces its `params_limit` only for parameters separated by `&`, while still splitting on both `&` and `;`. As a result, attackers could use `;` separators to bypass the parameter count limit and submit more parameters than intended. CVE-2025-59830
GHSA-625h-95r8-8xpm
VCID-xazq-qrm1-9ff6 Rack session gets restored after deletion ### Summary When using the `Rack::Session::Pool` middleware, simultaneous rack requests can restore a deleted rack session, which allows the unauthenticated user to occupy that session. ### Details [Rack session middleware](https://github.com/rack/rack/blob/v2.2.13/lib/rack/session/abstract/id.rb#L263-L270) prepares the session at the beginning of request, then saves is back to the store with possible changes applied by host rack application. This way the session becomes to be a subject of race conditions in general sense over concurrent rack requests. ### Impact When using the `Rack::Session::Pool` middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. ## Mitigation - Update to the latest version of `rack`, or - Ensure your application invalidates sessions atomically by marking them as logged out e.g., using a `logged_out` flag, instead of deleting them, and check this flag on every request to prevent reuse, or - Implement a custom session store that tracks session invalidation timestamps and refuses to accept session data if the session was invalidated after the request began. ### Related As this code was moved to `rack-session` in Rack 3+, see <https://github.com/rack/rack-session/security/advisories/GHSA-9j94-67jr-4cqj> for the equivalent advisory in `rack-session` (affecting Rack 3+ only). CVE-2025-32441
GHSA-vpfw-47h7-xj4g

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T08:59:17.992625+00:00 Debian Importer Fixing VCID-gdhf-e8q1-kbat https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:51:19.972131+00:00 Debian Importer Fixing VCID-xazq-qrm1-9ff6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-11T18:04:09.707384+00:00 Debian Importer Fixing VCID-xazq-qrm1-9ff6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:01:40.384979+00:00 Debian Importer Fixing VCID-gdhf-e8q1-kbat https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:52:20.772780+00:00 Debian Importer Fixing VCID-gdhf-e8q1-kbat https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:20.579556+00:00 Debian Importer Fixing VCID-xazq-qrm1-9ff6 https://security-tracker.debian.org/tracker/data/json 38.1.0