Bug 2364966 (CVE-2025-46727)
Summary: | CVE-2025-46727 rubygem-rack: Unbounded-Parameter DoS in Rack::QueryParser | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | akostadi, amasferr, anthomas, cbartlet, dmayorov, ehelms, ggainey, jcantril, jlledo, juwatts, mhulan, mmakovy, nmoumoul, osousa, pcreech, periklis, rchan, rojacob, smallamp, tjochec |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | --- | |
Doc Text: |
A flaw was found in Rack::QueryParser. This vulnerability allows denial of service via oversized HTTP requests containing many parameters, resulting in memory exhaustion that consumes all available memory or CPU resource pinning, which keeps the CPU constantly busy.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2364996, 2364997, 2364999, 2365000, 2364998 | ||
Bug Blocks: |
Description
OSIDB Bzimport
2025-05-08 00:01:08 UTC
This issue has been addressed in the following products: Red Hat Satellite 6.17 for RHEL 9 Via RHSA-2025:7604 https://access.redhat.com/errata/RHSA-2025:7604 This issue has been addressed in the following products: Red Hat Satellite 6.16 for RHEL 8 Red Hat Satellite 6.16 for RHEL 9 Via RHSA-2025:7605 https://access.redhat.com/errata/RHSA-2025:7605 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:8254 https://access.redhat.com/errata/RHSA-2025:8254 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:8256 https://access.redhat.com/errata/RHSA-2025:8256 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2025:8279 https://access.redhat.com/errata/RHSA-2025:8279 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:8290 https://access.redhat.com/errata/RHSA-2025:8290 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:8291 https://access.redhat.com/errata/RHSA-2025:8291 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:8289 https://access.redhat.com/errata/RHSA-2025:8289 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:8288 https://access.redhat.com/errata/RHSA-2025:8288 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:8319 https://access.redhat.com/errata/RHSA-2025:8319 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:8322 https://access.redhat.com/errata/RHSA-2025:8322 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Telecommunications Update Service Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Via RHSA-2025:8323 https://access.redhat.com/errata/RHSA-2025:8323 This issue has been addressed in the following products: Red Hat Satellite 6.15 for RHEL 8 Via RHSA-2025:9838 https://access.redhat.com/errata/RHSA-2025:9838 |