Update

USN-7960-1: Rack vulnerabilities

USN-7960-1: Rack vulnerabilities

Publication date: 14 January 2026
Overview: Several security issues were fixed in Rack.

Packages
ruby-rack - modular Ruby webserver interface

Details
It was discovered that Rack incorrectly handled certain query parameters.
An attacker could possibly use this issue to cause a limited denial of
service. This issue was only addressed in Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS. (CVE-2025-59830)

It was discovered that Rack did not properly handle certain multipart
form data. An attacker could possibly use this issue to cause memory
exhaustion, leading to a denial of service. This issue was only addressed
in Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10.
(CVE-2025-61770, CVE-2025-61772)

It was discovered that Rack did not properly handle certain form fields.
An attacker could possibly use this issue to cause memory exhaustion,
leading to a denial of service. This issue was only addressed in Ubuntu
22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2025-61771)

It was discovered that Rack did not properly handle certain headers. An
attacker could possibly use this issue to bypass proxy access
restrictions and obtain sensitive information. (CVE-2025-61780)

Tomoya Yamashita discovered that Rack did not properly manage memory
under certain circumstances. An attacker could possibly use this issue to
cause memory exhaustion, leading to a denial of service. This issue was
only addressed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS
and Ubuntu 25.10. (CVE-2025-61919)

Update instructions
In general, a standard system update will make all the necessary changes.

The problem can be corrected by updating your system to the following package versions:

  • 25.10 questing ruby-rack – 3.1.16-0.1ubuntu0.1
  • 24.04 LTS noble ruby-rack – 2.2.7-1ubuntu0.5
  • 22.04 LTS jammy ruby-rack – 2.1.4-5ubuntu1.2
  • 20.04 LTS focal ruby-rack – 2.0.7-2ubuntu0.1+esm8
  • 18.04 LTS bionic ruby-rack – 1.6.4-4ubuntu0.2+esm9
  • 16.04 LTS xenial ruby-rack – 1.6.4-3ubuntu0.2+esm9
The manufacturer Canonical has not yet set up its devicebase profile. Content such as updates, compatibilities and support may only be maintained with a delay.
Receive Important Update Messages Stay tuned for upcoming Canonical updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad