[DRE-maint] Bug#1128479: ruby-rack: CVE-2026-22860

Salvatore Bonaccorso carnil at debian.org
Fri Feb 20 08:05:23 GMT 2026


Source: ruby-rack
Version: 3.2.4-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Control: found -1 3.1.18-1
Control: found -1 3.1.18-1~deb13u1
Control: found -1 2.2.20-0+deb12u1

Hi,

The following vulnerability was published for ruby-rack.

CVE-2026-22860[0]:
| Rack is a modular Ruby web server interface. Prior to versions
| 2.2.22, 3.1.20, and 3.2.5, `Rack::Directory`’s path check used a
| string prefix match on the expanded path. A request like
| `/../root_example/` can escape the configured root if the target
| path starts with the root string, allowing directory listing outside
| the intended root. Versions 2.2.22, 3.1.20, and 3.2.5 fix the issue.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-22860
    https://www.cve.org/CVERecord?id=CVE-2026-22860
[1] https://github.com/rack/rack/security/advisories/GHSA-mxw3-3hh2-x2mh

Regards,
Salvatore


More information about the Pkg-ruby-extras-maintainers mailing list