CVE Vulnerabilities

CVE-2025-61771

Uncontrolled Resource Consumption

Published: Oct 07, 2025 | Modified: Oct 10, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM

Rack is a modular Ruby web server interface. In versions prior to 2.2.19, 3.1.17, and 3.2.2, ``Rack::Multipart::Parserstores non-file form fields (parts without afilename) entirely in memory as Ruby Stringobjects. A single large text field in a multipart/form-data request (hundreds of megabytes or more) can consume equivalent process memory, potentially leading to out-of-memory (OOM) conditions and denial of service (DoS). Attackers can send large non-file fields to trigger excessive memory usage. Impact scales with request size and concurrency, potentially leading to worker crashes or severe garbage-collection overhead. All Rack applications processing multipart form submissions are affected. Versions 2.2.19, 3.1.17, and 3.2.2 enforce a reasonable size cap for non-file fields (e.g., 2 MiB). Workarounds include restricting maximum request body size at the web-server or proxy layer (e.g., Nginxclient_max_body_size`) and validating and rejecting unusually large form fields at the application level.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

Name Vendor Start Version End Version
Rack Rack * 2.2.19 (excluding)
Rack Rack 3.1.0 (including) 3.1.17 (excluding)
Rack Rack 3.2.0 (including) 3.2.2 (excluding)
Red Hat Enterprise Linux 10 RedHat pcs-0:0.12.0-3.el10_0.3 *
Red Hat Enterprise Linux 10 RedHat pcs-0:0.12.1-1.el10_1.1 *
Red Hat Enterprise Linux 7 Extended Lifecycle Support RedHat pcs-0:0.9.169-3.el7_9.5 *
Red Hat Enterprise Linux 8 RedHat pcs-0:0.10.18-2.el8_10.7 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat pcs-0:0.10.8-1.el8_4.8 *
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On RedHat pcs-0:0.10.8-1.el8_4.8 *
Red Hat Enterprise Linux 8.6 Telecommunications Update Service RedHat pcs-0:0.10.12-6.el8_6.10 *
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions RedHat pcs-0:0.10.12-6.el8_6.10 *
Red Hat Enterprise Linux 8.8 Telecommunications Update Service RedHat pcs-0:0.10.15-4.el8_8.9 *
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions RedHat pcs-0:0.10.15-4.el8_8.9 *
Red Hat Enterprise Linux 9 RedHat pcs-0:0.11.9-2.el9_6.2 *
Red Hat Enterprise Linux 9 RedHat pcs-0:0.11.10-1.el9_7.1 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat pcs-0:0.11.1-10.el9_0.9 *

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References