DEBIAN-CVE-2025-46336

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2025-46336
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-46336.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-46336
Upstream
Published
2025-05-08T20:15:30Z
Modified
2025-09-19T06:17:33Z
Summary
[none]
Details

Rack::Session is a session management implementation for Rack. In versions starting from 2.0.0 to before 2.1.1, when using the Rack::Session::Pool middleware, and provided the attacker can acquire a session cookie (already a major issue), the session may be restored if the attacker can trigger a long running request (within that same session) adjacent to the user logging out, in order to retain illicit access even after a user has attempted to logout. This issue has been patched in version 2.1.1.

References

Affected packages

Debian:13 / ruby-rack-session

Package

Name
ruby-rack-session
Purl
pkg:deb/debian/ruby-rack-session?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.1-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / ruby-rack-session

Package

Name
ruby-rack-session
Purl
pkg:deb/debian/ruby-rack-session?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.1-0.1

Ecosystem specific

{
    "urgency": "not yet assigned"
}