Bug 2403180 (CVE-2025-61919)

Summary: CVE-2025-61919 rubygem-rack: Unbounded read in `Rack::Request` form parsing can lead to memory exhaustion
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: akostadi, amasferr, anthomas, cbartlet, crizzo, dmayorov, eglynn, ehelms, ggainey, jcantril, jjoyce, jlledo, jschluet, juwatts, jvasik, kaycoth, lhh, lsvaty, mburns, mgarciac, mhulan, mmakovy, nmoumoul, osousa, pantinor, pcreech, pgrist, rblanco, rchan, rojacob, smallamp, tjochec, tmalecek, tsedmik, vmugicag
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A memory-exhaustion vulnerability exists in Rack when parsing application/x-www-form-urlencoded request bodies. Rack::Request#POST reads the entire request body into memory without enforcing a maximum length or cap. Attackers can exploit this by sending large form submissions, potentially causing denial of service (DoS) through memory exhaustion. Even with configured parsing limits, the issue occurs before those limits are enforced, allowing unbounded memory allocation proportional to request size.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2403521, 2403522, 2403523, 2403524, 2403525    
Bug Blocks:    

Description OSIDB Bzimport 2025-10-10 20:01:43 UTC
Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, `Rack::Request#POST` reads the entire request body into memory for `Content-Type: application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcing a length or cap. Large request bodies can therefore be buffered completely into process memory before parsing, leading to denial of service (DoS) through memory exhaustion. Users should upgrade to Rack version 2.2.20, 3.1.18, or 3.2.3, anu of which enforces form parameter limits using `query_parser.bytesize_limit`, preventing unbounded reads of `application/x-www-form-urlencoded` bodies. Additionally, enforce strict maximum body size at the proxy or web server layer (e.g., Nginx `client_max_body_size`, Apache `LimitRequestBody`).

Comment 4 errata-xmlrpc 2025-11-03 20:11:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:19513 https://access.redhat.com/errata/RHSA-2025:19513

Comment 5 errata-xmlrpc 2025-11-03 20:18:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:19512 https://access.redhat.com/errata/RHSA-2025:19512

Comment 6 errata-xmlrpc 2025-11-04 11:16:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:19647 https://access.redhat.com/errata/RHSA-2025:19647

Comment 7 errata-xmlrpc 2025-11-04 17:00:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:19719 https://access.redhat.com/errata/RHSA-2025:19719

Comment 8 errata-xmlrpc 2025-11-04 19:47:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:19733 https://access.redhat.com/errata/RHSA-2025:19733

Comment 9 errata-xmlrpc 2025-11-04 19:58:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:19734 https://access.redhat.com/errata/RHSA-2025:19734

Comment 10 errata-xmlrpc 2025-11-04 23:33:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:19736 https://access.redhat.com/errata/RHSA-2025:19736

Comment 11 errata-xmlrpc 2025-11-05 13:08:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:19800 https://access.redhat.com/errata/RHSA-2025:19800

Comment 12 errata-xmlrpc 2025-11-05 23:45:42 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.17 for RHEL 9

Via RHSA-2025:19832 https://access.redhat.com/errata/RHSA-2025:19832

Comment 13 errata-xmlrpc 2025-11-06 02:23:46 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.16 for RHEL 8
  Red Hat Satellite 6.16 for RHEL 9

Via RHSA-2025:19855 https://access.redhat.com/errata/RHSA-2025:19855

Comment 14 errata-xmlrpc 2025-11-06 02:25:01 UTC
This issue has been addressed in the following products:

  Red Hat Satellite 6.15 for RHEL 8

Via RHSA-2025:19856 https://access.redhat.com/errata/RHSA-2025:19856

Comment 15 errata-xmlrpc 2025-11-10 01:34:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2025:19948 https://access.redhat.com/errata/RHSA-2025:19948

Comment 16 errata-xmlrpc 2025-11-11 15:01:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:20962 https://access.redhat.com/errata/RHSA-2025:20962

Comment 17 errata-xmlrpc 2025-11-11 19:48:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:21036 https://access.redhat.com/errata/RHSA-2025:21036

Comment 18 errata-xmlrpc 2025-11-18 14:39:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:21696 https://access.redhat.com/errata/RHSA-2025:21696