File _patchinfo of Package patchinfo.41699

<patchinfo incident="41699">
  <issue tracker="bnc" id="1253951">VUL-0: CVE-2025-61780: rubygem-rack, rubygem-rack-1_6: improper handling of headers in `Rack::Sendfile` allows for bypass of proxy-level access restrictions</issue>
  <issue tracker="bnc" id="1251936">VUL-0: CVE-2025-61919: rubygem-rack: rack: application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcing a length or cap</issue>
  <issue tracker="cve" id="2025-61780"/>
  <issue tracker="cve" id="2025-61919"/>
  <packager>aburlakov</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for rubygem-rack</summary>
  <description>This update for rubygem-rack fixes the following issues:

- Update to version 2.2.20 (bsc#1251936)
- CVE-2025-61919: Fixed application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcing a length or cap (bsc#1251936)
- CVE-2025-61780: Fixed improper handling of headers in `Rack::Sendfile` allows for bypass of proxy-level access restrictions (bsc#1253951)
</description>
</patchinfo>
openSUSE Build Service is sponsored by