File _patchinfo of Package patchinfo.41699
<patchinfo incident="41699"> <issue tracker="bnc" id="1253951">VUL-0: CVE-2025-61780: rubygem-rack, rubygem-rack-1_6: improper handling of headers in `Rack::Sendfile` allows for bypass of proxy-level access restrictions</issue> <issue tracker="bnc" id="1251936">VUL-0: CVE-2025-61919: rubygem-rack: rack: application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcing a length or cap</issue> <issue tracker="cve" id="2025-61780"/> <issue tracker="cve" id="2025-61919"/> <packager>aburlakov</packager> <rating>important</rating> <category>security</category> <summary>Security update for rubygem-rack</summary> <description>This update for rubygem-rack fixes the following issues: - Update to version 2.2.20 (bsc#1251936) - CVE-2025-61919: Fixed application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcing a length or cap (bsc#1251936) - CVE-2025-61780: Fixed improper handling of headers in `Rack::Sendfile` allows for bypass of proxy-level access restrictions (bsc#1253951) </description> </patchinfo>